Sciweavers

4761 search results - page 863 / 953
» Components, Frameworks, Patterns
Sort
View
CGO
2010
IEEE
15 years 10 months ago
Exploiting statistical correlations for proactive prediction of program behaviors
This paper presents a finding and a technique on program behavior prediction. The finding is that surprisingly strong statistical correlations exist among the behaviors of diffe...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Feng Mao, ...
WEBDB
2009
Springer
131views Database» more  WEBDB 2009»
15 years 9 months ago
Functional Dependency Generation and Applications in Pay-As-You-Go Data Integration Systems
Recently, the opportunity of extracting structured data from the Web has been identified by a number of research projects. One such example is that millions of relational-style H...
Daisy Zhe Wang, Xin Luna Dong, Anish Das Sarma, Mi...
SACMAT
2009
ACM
15 years 9 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
WOWMOM
2009
ACM
188views Multimedia» more  WOWMOM 2009»
15 years 9 months ago
Mobility management for NGN WiMAX: Specification and implementation
The anticipated deployment of IEEE 802.16-based wireless metropolitan area networks (WMANs) will usher a new era in broadband wireless communications. The adoption of the WiMAX te...
Pedro Neves, Ricardo Matos, Bruno Sousa, Giada Lan...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 9 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu