Sciweavers

239 search results - page 34 / 48
» Blooms
Sort
View
FSKD
2009
Springer
138views Fuzzy Logic» more  FSKD 2009»
15 years 11 months ago
Censoring Biological Echoes in Weather Radar Images
Weather radar data is susceptible to several artifacts due to anamalous propagation, ground clutter, electronic interference, sun angle, second-trip echoes and biological contamin...
Valliappa Lakshmanan, Jian Zhang
OOPSLA
2009
Springer
15 years 11 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
SPIN
2009
Springer
15 years 11 months ago
Fast, All-Purpose State Storage
Existing techniques for approximate storage of visited states in a model checker are too special-purpose and too DRAM-intensive. Bitstate hashing, based on Bloom filters, is good ...
Peter C. Dillinger, Panagiotis Manolios
130
Voted
PETRA
2009
ACM
15 years 11 months ago
Towards a social fabric for pervasive assistive environments
The digital divide refers to a lack of technological access, part of which involves exclusion from a blooming arena of social interaction. People without mobile phones or PCs cann...
Clare Owens, David E. Millard, Andrew Stanford-Cla...
SECON
2008
IEEE
15 years 11 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang