Sciweavers

2913 search results - page 228 / 583
» How Much to Copy
Sort
View
69
Voted
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
16 years 29 days ago
Distributed deviation detection in sensor networks
Sensor networks have recently attracted much attention, because of their potential applications in a number of different settings. The sensors can be deployed in large numbers in ...
Themistoklis Palpanas, Dimitris Papadopoulos, Vana...
ICFP
2009
ACM
15 years 7 months ago
Finding race conditions in Erlang with QuickCheck and PULSE
We address the problem of testing and debugging concurrent, distributed Erlang applications. In concurrent programs, race conditions are a common class of bugs and are very hard t...
Koen Claessen, Michal Palka, Nicholas Smallbone, J...
76
Voted
ATAL
2009
Springer
15 years 7 months ago
Inconsistency tolerance in weighted argument systems
We introduce and investigate a natural extension of Dung’s well-known model of argument systems in which attacks are associated with a weight, indicating the relative strength o...
Paul E. Dunne, Anthony Hunter, Peter McBurney, Sim...
128
Voted
HUMO
2007
Springer
15 years 7 months ago
Semi-Latent Dirichlet Allocation: A Hierarchical Model for Human Action Recognition
We propose a new method for human action recognition from video sequences using latent topic models. Video sequences are represented by a novel “bag-of-words” representation, w...
Yang Wang 0003, Payam Sabzmeydani, Greg Mori
91
Voted
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 7 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...