Sciweavers

271 search results - page 38 / 55
» Multi-target Detection by Multi-sensor Systems: A Comparison...
Sort
View
USS
2010
14 years 7 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
DFT
2000
IEEE
119views VLSI» more  DFT 2000»
15 years 2 months ago
An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications
1 Over the last years, an increasing number of safety-critical tasks have been demanded to computer systems. In particular, safety-critical computer-based applications are hitting ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
IISWC
2008
IEEE
15 years 4 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
AIED
2007
Springer
15 years 3 months ago
Learning Engagement: What Actions of Learners Could Best Predict It?
One important aspect of motivation is engagement. In order to learn, students need to be engaged in the learning activities. However, that does not always happen due to various fac...
Mihaela Cocea
CORR
2008
Springer
89views Education» more  CORR 2008»
14 years 9 months ago
Idiotypic Immune Networks in Mobile Robot Control
Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...