Sciweavers

2468 search results - page 217 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 10 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
PODS
2005
ACM
124views Database» more  PODS 2005»
16 years 4 months ago
Diagnosis of asynchronous discrete event systems: datalog to the rescue!
We consider query optimization techniques for data intensive P2P applications. We show how to adapt an old technique from deductive databases, namely Query-Sub-Query (QSQ), to a s...
Serge Abiteboul, Stefan Haar, Tova Milo, Zoë ...
169
Voted
IROS
2006
IEEE
202views Robotics» more  IROS 2006»
15 years 10 months ago
Topological characterization of mobile robot behavior
— We propose to classify the behaviors of a mobile robot thanks to topological methods as an alternative to metric ones. To do so, we adapt an analysis scheme from Physics of non...
Aurélien Hazan, Frédéric Dave...
IJITN
2010
177views more  IJITN 2010»
15 years 1 months ago
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras
With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology fo...
Rui Peng, Alexander J. Aved, Kien A. Hua
EDOC
2004
IEEE
15 years 7 months ago
A Framework for Integrating Business Processes and Business Requirements
Service-oriented architectures and Web service infrastructure provide the ideal framework for interconnecting organizations and for defining distributed business applications. The...
Raman Kazhamiakin, Marco Pistore, Marco Roveri