Sciweavers

1172 search results - page 116 / 235
» Using Small Screen Space More Efficiently
Sort
View
126
Voted
CONEXT
2007
ACM
15 years 7 months ago
The diameter of opportunistic mobile networks
Portable devices have more data storage and increasing communication capabilities everyday. In addition to classic infrastructure based communication, these devices can exploit hu...
Augustin Chaintreau, Abderrahmen Mtibaa, Laurent M...
217
Voted
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
16 years 5 months ago
On MBR Approximation of Histories for Historical Queries: Expectations and Limitations
Traditional approaches for efficiently processing historical queries, where a history is a multidimensional timeseries, employ a two step filter-and-refine scheme. In the filter s...
Reza Sherkat, Davood Rafiei
99
Voted
AAAI
1990
15 years 4 months ago
A Hierarchical Planner that Generates Its Own Hierarchies
PABLO' is a nonlinear planner that reasons hially by generating abstract predicates. PABLO's abstract search spaces are generated automatically using predicate relaxatio...
Jens Christensen
112
Voted
ANCS
2006
ACM
15 years 7 months ago
Packet pre-filtering for network intrusion detection
As Intrusion Detection Systems (IDS) utilize more complex syntax to efficiently describe complex attacks, their processing requirements increase rapidly. Hardware and, even more, ...
Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N....
115
Voted
DKE
2008
106views more  DKE 2008»
15 years 3 months ago
Towards optimal k-anonymization
When releasing microdata for research purposes, one needs to preserve the privacy of respondents while maximizing data utility. An approach that has been studied extensively in re...
Tiancheng Li, Ninghui Li