Sciweavers

5948 search results - page 1137 / 1190
» Computing Robust Counter-Strategies
Sort
View
SIGMOD
1995
ACM
116views Database» more  SIGMOD 1995»
15 years 1 months ago
Incremental Maintenance of Views with Duplicates
We study the problem of e cient maintenance of materialized views that may contain duplicates. This problem is particularly important when queries against such views involve aggre...
Timothy Griffin, Leonid Libkin
NSDI
2008
15 years 6 days ago
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
ACIVS
2008
Springer
14 years 12 months ago
Motion Recovery for Uncalibrated Turntable Sequences Using Silhouettes and a Single Point
Abstract. This paper addresses the problem of self-calibration and motion recovery for turntable sequences. Previous works exploited silhouette correspondences induced by epipolar ...
Hui Zhang, Ling Shao, Kwan-Yee Kenneth Wong
ACSAC
2008
IEEE
14 years 12 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....
ATAL
2008
Springer
14 years 12 months ago
Anonymity-proof Shapley value: extending shapley value for coalitional games in open environments
Coalition formation is an important capability for automated negotiation among self-interested agents. In order for coalitions to be stable, a key question that must be answered i...
Naoki Ohta, Vincent Conitzer, Yasufumi Satoh, Atsu...
« Prev « First page 1137 / 1190 Last » Next »