Sciweavers

2642 search results - page 97 / 529
» The development of Chez Scheme
Sort
View
107
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Outlier-aware robust clustering
Clustering is a basic task in a variety of machine learning applications. Partitioning a set of input vectors into compact, wellseparated subsets can be severely affected by the p...
Pedro A. Forero, Vassilis Kekatos, Georgios B. Gia...
137
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
126
Voted
DOLAP
1998
ACM
15 years 5 months ago
Methodological Framework for Data Warehouse Design
Though designing a data warehouse requires techniques completely different from those adopted for operational systems, no significant effort has been made so far to develop a comp...
Matteo Golfarelli, Stefano Rizzi
86
Voted
PLDI
1998
ACM
15 years 5 months ago
Units: Cool Modules for HOT Languages
A module system ought to enable assembly-line programming using separate compilation and an expressive linking language. Separate compilation allows programmers to develop parts o...
Matthew Flatt, Matthias Felleisen
WETICE
1997
IEEE
15 years 4 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...