Sciweavers

43264 search results - page 8331 / 8653
» Comparing models of computation
Sort
View
ICITS
2009
15 years 25 days ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...
ICMCS
2009
IEEE
97views Multimedia» more  ICMCS 2009»
15 years 25 days ago
Some new directions in graph-based semi-supervised learning
In this position paper, we first review the state-of-the-art in graph-based semi-supervised learning, and point out three limitations that are particularly relevant to multimedia ...
Xiaojin Zhu, Andrew B. Goldberg, Tushar Khot
ICMLA
2009
15 years 25 days ago
Discovering Rules from Disk Events for Predicting Hard Drive Failures
Detecting impending failure of hard disks is an important prediction task which might help computer systems to prevent loss of data and performance degradation. Currently most of t...
Vipul Agarwal, Chiranjib Bhattacharyya, Thirumale ...
ICRA
2009
IEEE
126views Robotics» more  ICRA 2009»
15 years 25 days ago
Time-bounded lattice for efficient planning in dynamic environments
For vehicles navigating initially unknown cluttered environments, current state-of-the-art planning algorithms are able to plan and re-plan dynamically-feasible paths efficiently a...
Aleksandr Kushleyev, Maxim Likhachev
ICSE
2009
IEEE-ACM
15 years 25 days ago
Architecting Robustness and Timeliness in a New Generation of Aerospace Systems
Aerospace systems have strict dependability and real-time requirements, as well as a need for flexible resource reallocation and reduced size, weight and power consumption. To cope...
José Rufino, João Craveiro, Paulo Ve...
« Prev « First page 8331 / 8653 Last » Next »