Sciweavers

2715 search results - page 425 / 543
» An Implementation of Narrowing Strategies
Sort
View
VLDB
1992
ACM
101views Database» more  VLDB 1992»
14 years 2 months ago
Proclamation-Based Model for Cooperating Transactions
We propose a transaction model that provides a framework for transactions to cooperate without sacrificing serializability as a notion of correctness. Cooperation does not depend ...
H. V. Jagadish, Oded Shmueli
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
14 years 2 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
SP
1990
IEEE
14 years 2 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
AI
2007
Springer
14 years 2 months ago
Pattern Classification in No-Limit Poker: A Head-Start Evolutionary Approach
We have constructed a poker classification system which makes informed betting decisions based upon three defining features extracted while playing poker: hand value, risk, and agg...
Brien Beattie, Garrett Nicolai, David Gerhard, Rob...
CHINZ
2007
ACM
14 years 2 months ago
Using a mobile phone for 6 DOF mesh editing
This paper describes how a mobile phone can be used as a six degree of freedom interaction device for 3D mesh editing. Using a video see-through Augmented Reality approach, the mo...
Anders Henrysson, Mark Billinghurst