Sciweavers

1239 search results - page 225 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
82
Voted
PRDC
2000
IEEE
15 years 1 months ago
Transient errors and rollback recovery in LZ compression
This paper analyzes the data integrity of one of the most widely used lossless data compression techniques, Lempel-Ziv (LZ) compression. In this algorithm, because the data recons...
Wei-Je Huang, Edward J. McCluskey
ICVS
1999
Springer
15 years 1 months ago
Face-Tracking and Coding for Video Compression
While computing power and transmission bandwidth have both been steadily increasing over the last few years, bandwidth rather than processing power remains the primary bottleneck f...
William E. Vieux, Karl Schwerdt, James L. Crowley
ISD
1999
Springer
262views Database» more  ISD 1999»
15 years 1 months ago
Spatial Pictogram Enhanced Conceptual Data Models and Their Translation to Logical Data Models
The successful development of any geographic information system project needs the careful design and implementation of spatial databases via conceptual and logical data-modeling. T...
Shashi Shekhar, Ranga Raju Vatsavai, Sanjay Chawla...
ATAL
2009
Springer
15 years 1 months ago
Norm-based behaviour modification in BDI agents
While there has been much work on developing frameworks and models of norms and normative systems, consideration of the impact of norms on the practical reasoning of agents has at...
Felipe Rech Meneguzzi, Michael Luck
78
Voted
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 1 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio