Sciweavers

1950 search results - page 389 / 390
» Two Abstractions for Distributed Systems of Mobile Nodes
Sort
View
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
15 years 3 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
15 years 2 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
JELIA
2000
Springer
15 years 29 days ago
An Algorithmic Approach to Recover Inconsistent Knowledge-Bases
Abstract. We consider an algorithmic approach for revising inconsistent data and restoring its consistency. This approach detects the\spoiled" part of the data (i.e., the set ...
Ofer Arieli
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
14 years 8 months ago
Real-time monocular SLAM: Why filter?
Abstract— While the most accurate solution to off-line structure from motion (SFM) problems is undoubtedly to extract as much correspondence information as possible and perform g...
Hauke Strasdat, J. M. M. Montiel, Andrew J. Daviso...
LCTRTS
2010
Springer
14 years 7 months ago
Translating concurrent action oriented specifications to synchronous guarded actions
Concurrent Action-Oriented Specifications (CAOS) model the behavior of a synchronous hardware circuit as asynchronous guarded at an abstraction level higher than the Register Tran...
Jens Brandt, Klaus Schneider, Sandeep K. Shukla