Sciweavers

47 search results - page 5 / 10
» A Novel Approach to Hide Credentials
Sort
View
IV
2005
IEEE
183views Visualization» more  IV 2005»
15 years 3 months ago
3D Information Visualization for Time Dependent Data on Maps
The visual analysis of time dependent data is an essential task in many application fields. However, visualizing large time dependent data collected within a spatial context is st...
Christian Tominski, Petra Schulze-Wollgast, Heidru...
DEXAW
2006
IEEE
132views Database» more  DEXAW 2006»
15 years 3 months ago
Tokens for Anonymous Communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli, R...
AAAI
1990
14 years 10 months ago
Tree Decomposition with Applications to Constraint Processing
This paper concerns the task of removing redundant information from a given knowledge base, and restructuring it in the form of a tree, so as to admit efficient problem solving ro...
Itay Meiri, Judea Pearl, Rina Dechter
APAL
2008
104views more  APAL 2008»
14 years 9 months ago
Infinite trace equivalence
We solve a longstanding problem by providing a denotational model for nondeterministic programs that identifies two programs iff they have the same range of possible behaviours. W...
Paul Blain Levy
CLUSTER
2007
IEEE
14 years 9 months ago
Anonymous communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi