Sciweavers

8658 search results - page 1508 / 1732
» Models of Command and Control
Sort
View
CIKM
2005
Springer
15 years 10 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
CIS
2005
Springer
15 years 10 months ago
Distance Protection of Compensated Transmission Line Using Computational Intelligence
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
DIGRA
2005
Springer
15 years 10 months ago
Albert Goes Narrative Contracting
RPG’s (Role Playing Games) and improvisational theatre have some obvious similarities. Both require the participants to work together in real-time to construct dynamic narrative...
Ken Newman, Robert Grigg
DRM
2005
Springer
15 years 10 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
EDO
2005
Springer
15 years 10 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
« Prev « First page 1508 / 1732 Last » Next »