Sciweavers

2061 search results - page 307 / 413
» The continuous knapsack set
Sort
View
ISCI
2008
93views more  ISCI 2008»
14 years 10 months ago
Safety, domain independence and translation of complex value database queries
This paper considers the theory of database queries on the complex value data model with external functions. Motivated by concerns regarding query evaluation, we first identify re...
Hong-Cheu Liu, Jeffrey Xu Yu, Weifa Liang
ISCI
2008
120views more  ISCI 2008»
14 years 10 months ago
Using cooperative mobile agents to monitor distributed and dynamic environments
Monitoring the changes in data values obtained from the environment (e.g., locations of moving objects) is a primary concern in many fields, as for example in the pervasive comput...
Sergio Ilarri, Eduardo Mena, Arantza Illarramendi
IJISEC
2006
113views more  IJISEC 2006»
14 years 10 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...
IJON
2006
71views more  IJON 2006»
14 years 10 months ago
A neurocomputational model of stochastic resonance and aging
Stochastic resonance (SR) is fundamental to physical and biological processes. Here, we use a stochastic gain-tuning model to investigate interactions between aging-related increa...
Shu-Chen Li, Timo von Oertzen, Ulman Lindenberger
CORR
2007
Springer
105views Education» more  CORR 2007»
14 years 10 months ago
The source coding game with a cheating switcher
Motivated by the lossy compression of an active-vision video stream, we consider the problem of finding the rate-distortion function of an arbitrarily varying source (AVS) compos...
Hari Palaiyanur, Cheng Chang, Anant Sahai