Sciweavers

2501 search results - page 437 / 501
» Logics with Rank Operators
Sort
View
DAC
2007
ACM
15 years 8 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
147
Voted
EATIS
2007
ACM
15 years 8 months ago
Application layer multicast techniques in grid environments
Resource and service discovery, data transfer or replica management, are some examples of basic operations of a grid which can gain efficiency by using multicast transmission tech...
Rafael Moreno-Vozmediano
DEBS
2010
ACM
15 years 8 months ago
Predictive publish/subscribe matching
A new publish/subscribe capability is presented: the ability to predict the likelihood that a subscription will be matched at some point in the future. Composite subscriptions con...
Vinod Muthusamy, Haifeng Liu, Hans-Arno Jacobsen
182
Voted
ICCBR
2007
Springer
15 years 8 months ago
Application of the Revision Theory to Adaptation in Case-Based Reasoning: The Conservative Adaptation
Case-based reasoning aims at solving a problem by the adaptation of the solution of an already solved problem that has been retrieved in a case base. This paper defines an approach...
Jean Lieber
BROADNETS
2004
IEEE
15 years 7 months ago
Structures for In-Network Moving Object Tracking in Wireless Sensor Networks
One important application of wireless sensor networks is tracking moving objects. The recent progress has made it possible for tiny sensors to have more computing power and storag...
Chih-Yu Lin, Yu-Chee Tseng