Sciweavers

42388 search results - page 8074 / 8478
» Classification Using Information
Sort
View
MIDDLEWARE
2007
Springer
15 years 11 months ago
CAESAR: middleware for complex service-oriented peer-to-peer applications
Recent research advances in Peer-to-Peer (P2P) computing have enabled the P2P paradigm to be used for developing complex applications beyond file sharing and data storage. These ...
Lipo Chan, Shanika Karunasekera, Aaron Harwood, Eg...
OOPSLA
2007
Springer
15 years 11 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
PSIVT
2007
Springer
129views Multimedia» more  PSIVT 2007»
15 years 11 months ago
Multi-target Tracking with Poisson Processes Observations
This paper considers the problem of Bayesian inference in dynamical models with time-varying dimension. These models have been studied in the context of multiple target tracking pr...
Sergio Hernández, Paul Teal
TACAS
2007
Springer
165views Algorithms» more  TACAS 2007»
15 years 11 months ago
Multi-objective Model Checking of Markov Decision Processes
We study and provide efficient algorithms for multi-objective model checking problems for Markov Decision Processes (MDPs). Given an MDP, M, and given multiple linear-time (ω-regu...
Kousha Etessami, Marta Z. Kwiatkowska, Moshe Y. Va...
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 11 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
« Prev « First page 8074 / 8478 Last » Next »