Sciweavers

8493 search results - page 1427 / 1699
» Implementing a distributed firewall
Sort
View
TKDE
2011
363views more  TKDE 2011»
14 years 11 months ago
Efficient Techniques for Online Record Linkage
—The need to consolidate the information contained in heterogeneous data sources has been widely documented in recent years. In order to accomplish this goal, an organization mus...
Debabrata Dey, Vijay S. Mookerjee, Dengpan Liu
IEE
2011
14 years 11 months ago
Using autonomous components to improve runtime qualities of software
: In the development of software systems, quality properties should be considered along with the development process so that the qualities of software systems can be inferred and p...
Wenpin Jiao
TASLP
2010
126views more  TASLP 2010»
14 years 11 months ago
Sound Field Reproduction using the Lasso
Reproducing a sampled sound field using an array of loudspeakers is a problem with well-appreciated applications to acoustics and ultrasound treatment. Loudspeaker signal design ha...
G. N. Lilis, Daniele Angelosante, Georgios B. Gian...
TDP
2010
189views more  TDP 2010»
14 years 11 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
TIM
2010
112views Education» more  TIM 2010»
14 years 11 months ago
Helmholtz-Type Regularization Method for Permittivity Reconstruction Using Experimental Phantom Data of Electrical Capacitance T
Electrical capacitance tomography (ECT) attempts to image the permittivity distribution of an object by measuring the electrical capacitance between sets of electrodes placed aroun...
Manuchehr Soleimani, Phaneendra K. Yalavarthy, Ham...
« Prev « First page 1427 / 1699 Last » Next »