Sciweavers

118 search results - page 20 / 24
» Branching-Time Property Preservation Between Real-Time Syste...
Sort
View
DKE
2006
79views more  DKE 2006»
14 years 9 months ago
Schema versioning in data warehouses: Enabling cross-version querying via schema augmentation
As several mature implementations of data warehousing systems are fully operational, a crucial role in preserving their up-to-dateness is played by the ability to manage the chang...
Matteo Golfarelli, Jens Lechtenbörger, Stefan...
ICCV
2009
IEEE
14 years 7 months ago
Efficient indexing for large scale visual search
With the popularity of "bag of visual terms" representations of images, many text indexing techniques have been applied in large-scale image retrieval systems. However, ...
Xiao Zhang, Zhiwei Li, Lei Zhang, Wei-Ying Ma, Heu...
TGC
2007
Springer
15 years 3 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
CLOUD
2010
ACM
15 years 2 months ago
G-Store: a scalable data store for transactional multi key access in the cloud
Cloud computing has emerged as a preferred platform for deploying scalable web-applications. With the growing scale of these applications and the data associated with them, scalab...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
83
Voted
AUTOMATICA
2007
88views more  AUTOMATICA 2007»
14 years 9 months ago
Three and higher dimensional autonomous formations: Rigidity, persistence and structural persistence
In this paper, we generalize the notion of persistence, which has been originally introduced for two-dimensional formations, to Rd for d 3, seeking to provide a theoretical framew...
Changbin Yu, Julien M. Hendrickx, Baris Fidan, Bri...