Sciweavers

9071 search results - page 1774 / 1815
» A co-design modeling approach for computer network systems
Sort
View
MM
2010
ACM
252views Multimedia» more  MM 2010»
14 years 10 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
IJDMMM
2008
119views more  IJDMMM 2008»
14 years 9 months ago
A relational perspective on spatial data mining
: Remote sensing and mobile devices nowadays collect a huge amount of spatial data, which have to be analysed in order to discover interesting information about economic, social an...
Donato Malerba
79
Voted
IJAOSE
2010
227views more  IJAOSE 2010»
14 years 8 months ago
Implementing reactive BDI agents with user-given constraints and objectives
CASO is an agent-oriented programming language based on AgentSpeak(L), one of the most influential abstract languages based on the BDI (Beliefs-Desires-Intentions) architecture. ...
Aniruddha Dasgupta, Aditya K. Ghose
89
Voted
KDD
2003
ACM
162views Data Mining» more  KDD 2003»
15 years 10 months ago
Improving spatial locality of programs via data mining
In most computer systems, page fault rate is currently minimized by generic page replacement algorithms which try to model the temporal locality inherent in programs. In this pape...
Karlton Sequeira, Mohammed Javeed Zaki, Boleslaw K...
PODS
2005
ACM
119views Database» more  PODS 2005»
15 years 9 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
« Prev « First page 1774 / 1815 Last » Next »