Sciweavers

102 search results - page 20 / 21
» Challenges in the Specification of Full Contracts
Sort
View
MOBIHOC
2010
ACM
14 years 7 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang
SOCIALCOM
2010
14 years 7 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
DOLAP
2010
ACM
14 years 7 months ago
Integrating OLAP and recommender systems: an evaluation perspective
The integration of OLAP with web-search technologies is a promising research topic. Recommender systems are popular web-search mechanisms, because they can address information ove...
Artus Krohn-Grimberghe, Alexandros Nanopoulos, Lar...
SIGMOD
2010
ACM
362views Database» more  SIGMOD 2010»
14 years 4 months ago
Data warehousing and analytics infrastructure at facebook
Scalable analysis on large data sets has been core to the functions of a number of teams at Facebook - both engineering and nonengineering. Apart from ad hoc analysis of data and ...
Ashish Thusoo, Zheng Shao, Suresh Anthony, Dhruba ...
SOICT
2010
14 years 4 months ago
Constraint-based local search for solving non-simple paths problems on graphs: application to the routing for network covering p
Routing problems have been considered as central problems in the fields of transportation, distribution and logistics. LS(Graph) is a generic framework allowing to model and solve...
Pham Quang Dung, Phan-Thuan Do, Yves Deville, Tuon...