Sciweavers

1230 search results - page 115 / 246
» On Abstraction in Scenarios
Sort
View
83
Voted
ICDE
2010
IEEE
539views Database» more  ICDE 2010»
16 years 14 days ago
Impact of Disk Corruption on Open-Source DBMS
Abstract-- Despite the best intentions of disk and RAID manufacturers, on-disk data can still become corrupted. In this paper, we examine the effects of corruption on database mana...
Sriram Subramanian, Yupu Zhang, Rajiv Vaidyanathan...
ESORICS
2009
Springer
15 years 7 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
ESA
2009
Springer
139views Algorithms» more  ESA 2009»
15 years 7 months ago
Optimality and Competitiveness of Exploring Polygons by Mobile Robots
Abstract. A mobile robot, represented by a point moving along a polygonal line in the plane, has to explore an unknown polygon and return to the starting point. The robot has a sen...
Jurek Czyzowicz, Arnaud Labourel, Andrzej Pelc
102
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Delay Tolerant Collaborations among Campus-Wide Wireless Users
Abstract—The ubiquitous deployment of wireless LAN networks are allowing students to embrace laptops as their preferred computing platform. We investigated the viability of build...
Xuwen Yu, Surendar Chandra
WCNC
2008
IEEE
15 years 7 months ago
Adaptive Routing in Dynamic Ad Hoc Networks
Abstract—Dynamic ad hoc networks are mobile ad hoc networks (MANETs) where network characteristics, such as network density and node mobility, change significantly over time and...
Cong Liu, Jie Wu