Sciweavers

689 search results - page 50 / 138
» Metrics for more than two points at once
Sort
View
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 3 months ago
XML Security Using XSLT
The eXtensible Markup Language (XML) is regarded generally as having promise of becoming established as the general purpose framework for enabling transfer of data amongst heterog...
R. G. Bartlett, M. W. Cook
ICPP
1999
IEEE
15 years 2 months ago
Trace-Level Reuse
Trace-level reuse is based on the observation that some traces (dynamic sequences of instructions) are frequently repeated during the execution of a program, and in many cases, th...
Antonio González, Jordi Tubella, Carlos Mol...
WSC
2008
15 years 3 days ago
Randomized methods for solving the Winner Determination Problem in combinatorial auctions
Combinatorial auctions, where buyers can bid on bundles of items rather than bidding them sequentially, often lead to more economically efficient allocations of financial resource...
Joshua C. C. Chan, Dirk P. Kroese
CORR
2008
Springer
81views Education» more  CORR 2008»
14 years 10 months ago
Relay vs. User Cooperation in Time-Duplexed Multiaccess Networks
The performance of user-cooperation in a multi-access network is compared to that of using a wireless relay. Using the total transmit and processing power consumed at all nodes as...
Lalitha Sankar, Gerhard Kramer, Narayan B. Mandaya...
EDBT
2008
ACM
113views Database» more  EDBT 2008»
15 years 10 months ago
Ensuring correctness over untrusted private database
In this paper we address the problem of ensuring the correctness of query results returned by an untrusted private database. The database owns the data and may modify it at any ti...
Sarvjeet Singh, Sunil Prabhakar