Sciweavers

94 search results - page 3 / 19
» dais 2006
Sort
View
ICDIM
2006
IEEE
15 years 6 months ago
A Bottom-up Strategy for Query Decomposition
Le Thi Thu Thuy, Doan Dai Duong, Virendrakumar C. ...
ICMCS
2006
IEEE
132views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Video Annotation by Active Learning and Semi-Supervised Ensembling
Yan Song, Guo-Jun Qi, Xian-Sheng Hua, Li-Rong Dai,...
JNCA
2006
86views more  JNCA 2006»
14 years 12 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
DAIS
2006
15 years 1 months ago
Using Speculative Push for Unnecessary Checkpoint Creation Avoidance
Abstract. This paper discusses a way of incorporating speculation techniques into Distributed Shared Memory (DSM) systems with checkpointing mechanism without creating unnecessary ...
Arkadiusz Danilecki, Michal Szychowiak
DAIS
2006
15 years 1 months ago
Intelligent Dependability Services for Overlay Networks
Application-level overlays have emerged as a useful means of offering network services that are not supported by the underlying physical network. Most overlays employ proprietary d...
Barry Porter, Geoff Coulson, Daniel Hughes