Sciweavers

3458 search results - page 611 / 692
» Abstracting Control
Sort
View
EUROSYS
2009
ACM
14 years 4 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle usersā€™ conļ¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
14 years 2 months ago
Collision avoidance in dynamic environments: An ICS-based solution and its comparative evaluation
Abstractā€” This paper presents ICS-AVOID, a collision avoidance scheme based upon the concept of Inevitable Collision State (ICS), ie a state for which, no matter what the future ...
Luis Martinez-Gomez, Thierry Fraichard
ADBIS
2009
Springer
140views Database» more  ADBIS 2009»
14 years 2 months ago
Optimizing Maintenance of Constraint-Based Database Caches
Abstract. Caching data reduces user-perceived latency and often enhances availability in case of server crashes or network failures. DB caching aims at local processing of declarat...
Joachim Klein 0002, Susanne Braun
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
14 years 2 months ago
On the Power of Uniform Power: Capacity of Wireless Networks with Bounded Resources
Abstract. The throughput capacity of arbitrary wireless networks under the physical Signal to Interference Plus Noise Ratio (SINR) model has received a greater deal of attention in...
Chen Avin, Zvi Lotker, Yvonne Anne Pignolet
IWANN
2009
Springer
14 years 2 months ago
Fuzzy Logic, Soft Computing, and Applications
We survey on the theoretical and practical developments of the theory of fuzzy logic and soft computing. Speciļ¬cally, we brieļ¬‚y review the history and main milestones of fuzzy ...
Inma P. Cabrera, Pablo Cordero, Manuel Ojeda-Acieg...