Sciweavers

734 search results - page 111 / 147
» Narrowing the Narrowing Space
Sort
View
IJUFKS
2002
78views more  IJUFKS 2002»
14 years 11 months ago
On the Security of Microaggregation with Individual Ranking: Analytical Attacks
Microaggregation is a statistical disclosure control technique. Raw microdata (i.e. individual records) are grouped into small aggregates prior to publication. With fixed-size grou...
Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Anna...
LOGCOM
1998
126views more  LOGCOM 1998»
14 years 11 months ago
Engineering AgentSpeak(L): A Formal Computational Model
Perhaps the most successful agent architectures, and certainly the best known, are those based on the Belief-Desire-Intention (BDI) framework. Despite the wealth of research that ...
Mark d'Inverno, Michael Luck
TC
1998
14 years 11 months ago
Using System-Level Models to Evaluate I/O Subsystem Designs
—We describe a system-level simulation model and show that it enables accurate predictions of both I/O subsystem and overall system performance. In contrast, the conventional app...
Gregory R. Ganger, Yale N. Patt
TON
1998
80views more  TON 1998»
14 years 11 months ago
Blocking and nonblocking multirate Clos switching networks
— This paper investigates in detail the blocking and nonblocking behavior of multirate Clos switching networks at the connection/virtual connection level. The results are applica...
Soung C. Liew, Ming-Hung Ng, Cathy W. Chan
TCSV
2002
66views more  TCSV 2002»
14 years 11 months ago
Multiframe blocking-artifact reduction for transform-coded video
A major drawback of block-based still-image or video-compression methods at low rates is the visible block boundaries that are also known as blocking artifacts. Several methods hav...
Bahadir K. Gunturk, Yucel Altunbasak, Russell M. M...