Sciweavers

3497 search results - page 46 / 700
» Making Distributed Applications Robust
Sort
View
DMDW
2000
118views Management» more  DMDW 2000»
15 years 1 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
JSAC
2007
224views more  JSAC 2007»
14 years 11 months ago
AMOEBA: Robust Location Privacy Scheme for VANET
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...
TCAD
2002
121views more  TCAD 2002»
14 years 11 months ago
Robust Boolean reasoning for equivalence checking and functional property verification
Many tasks in CAD, such as equivalence checking, property checking, logic synthesis, and false paths analysis require efficient Boolean reasoning for problems derived from circuits...
Andreas Kuehlmann, Viresh Paruthi, Florian Krohm, ...
ICCV
2007
IEEE
16 years 1 months ago
Graph Based Discriminative Learning for Robust and Efficient Object Tracking
Object tracking is viewed as a two-class 'one-versusrest' classification problem, in which the sample distribution of the target is approximately Gaussian while the back...
Xiaoqin Zhang, Weiming Hu, Stephen J. Maybank, Xi ...
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
15 years 5 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang