Sciweavers

239 search results - page 34 / 48
» Blooms
Sort
View
FSKD
2009
Springer
138views Fuzzy Logic» more  FSKD 2009»
14 years 1 months ago
Censoring Biological Echoes in Weather Radar Images
Weather radar data is susceptible to several artifacts due to anamalous propagation, ground clutter, electronic interference, sun angle, second-trip echoes and biological contamin...
Valliappa Lakshmanan, Jian Zhang
OOPSLA
2009
Springer
14 years 1 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
SPIN
2009
Springer
14 years 1 months ago
Fast, All-Purpose State Storage
Existing techniques for approximate storage of visited states in a model checker are too special-purpose and too DRAM-intensive. Bitstate hashing, based on Bloom filters, is good ...
Peter C. Dillinger, Panagiotis Manolios
PETRA
2009
ACM
14 years 1 months ago
Towards a social fabric for pervasive assistive environments
The digital divide refers to a lack of technological access, part of which involves exclusion from a blooming arena of social interaction. People without mobile phones or PCs cann...
Clare Owens, David E. Millard, Andrew Stanford-Cla...
SECON
2008
IEEE
14 years 1 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang