Sciweavers

94 search results - page 3 / 19
» dais 2006
Sort
View
ICDIM
2006
IEEE
15 years 3 months ago
A Bottom-up Strategy for Query Decomposition
Le Thi Thu Thuy, Doan Dai Duong, Virendrakumar C. ...
ICMCS
2006
IEEE
132views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Video Annotation by Active Learning and Semi-Supervised Ensembling
Yan Song, Guo-Jun Qi, Xian-Sheng Hua, Li-Rong Dai,...
JNCA
2006
86views more  JNCA 2006»
14 years 9 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
DAIS
2006
14 years 11 months ago
Using Speculative Push for Unnecessary Checkpoint Creation Avoidance
Abstract. This paper discusses a way of incorporating speculation techniques into Distributed Shared Memory (DSM) systems with checkpointing mechanism without creating unnecessary ...
Arkadiusz Danilecki, Michal Szychowiak
DAIS
2006
14 years 11 months ago
Intelligent Dependability Services for Overlay Networks
Application-level overlays have emerged as a useful means of offering network services that are not supported by the underlying physical network. Most overlays employ proprietary d...
Barry Porter, Geoff Coulson, Daniel Hughes