Sciweavers

1929 search results - page 296 / 386
» An Approach to Limit the Wynot Problem
Sort
View
EDBT
2008
ACM
151views Database» more  EDBT 2008»
14 years 9 months ago
Decentralized managing of replication objects in massively distributed systems
Data replication is a central technique to increase availability and performance of distributed systems. While offering many advantages it also requires more effort for ensuring d...
Daniel Klan, Kai-Uwe Sattler, Katja Hose, Marcel K...
SOSP
2009
ACM
14 years 5 months ago
Automatic device driver synthesis with termite
Faulty device drivers cause significant damage through down time and data loss. The problem can be mitigated by an improved driver development process that guarantees correctness...
Leonid Ryzhyk, Peter Chubb, Ihor Kuz, Etienne Le S...
EUROSEC
2010
ACM
14 years 3 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
ICASSP
2009
IEEE
14 years 3 months ago
Shrinkage estimation of high dimensional covariance matrices
We address covariance estimation under mean-squared loss in the Gaussian setting. Specifically, we consider shrinkage methods which are suitable for high dimensional problems wit...
Yilun Chen, Ami Wiesel, Alfred O. Hero
IROS
2009
IEEE
170views Robotics» more  IROS 2009»
14 years 3 months ago
Entrapment/escorting and patrolling missions in multi-robot cluster space control
— The tasks of entrapping/escorting and patrolling around an autonomous target are presented making use of the multi-robot cluster space control approach. The cluster space contr...
Ignacio Mas, Steven Li, Jose Acain, Christopher Ki...