Sciweavers

759 search results - page 85 / 152
» A Perspective on Knowledge Compilation
Sort
View
INDOCRYPT
2004
Springer
15 years 3 months ago
Information Theory and the Security of Binary Data Perturbation
Random data perturbation (RDP) has been in use for several years in statistical databases and public surveys as a means of providing privacy to individuals while collecting informa...
Poorvi L. Vora
ICDCS
2003
IEEE
15 years 3 months ago
Updates in Highly Unreliable, Replicated Peer-to-Peer Systems
This paper studies the problem of updates in decentralised and self-organising P2P systems in which peers have low online probabilities and only local knowledge. The update strate...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
MSE
2003
IEEE
103views Hardware» more  MSE 2003»
15 years 3 months ago
Teaching IP Core Development: An Example
The increasing gap between design productivity and chip complexity, and emerging systems-on-a-chip (SoC) have led to the wide utilization of reusable intellectual property (IP) co...
Aleksandar Milenkovic, David Fatzer
WISE
2000
Springer
15 years 2 months ago
VideoMAP*: A Web-based Architecture for a Spatio-Temporal Video Database Management System
In this paper, we present a web-based architecture of a spatiotemporal video data management system, which can accommodate a wide range of activities by various types of users. Be...
Shermann S.-M. Chan, Qing Li
ACSAC
1999
IEEE
15 years 2 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox