Sciweavers

3305 search results - page 554 / 661
» Can we Rely on SQL
Sort
View
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 10 months ago
Deploying Wireless Networks with Beeps
Abstract. We present the discrete beeping communication model, which assumes nodes have minimal knowledge about their environment and severely limited communication capabilities. S...
Alejandro Cornejo, Fabian Kuhn
IANDC
2008
105views more  IANDC 2008»
13 years 10 months ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...
PE
2008
Springer
167views Optimization» more  PE 2008»
13 years 10 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi
DEDS
2002
119views more  DEDS 2002»
13 years 10 months ago
Diagnosing Discrete-Event Systems: Extending the "Diagnoser Approach" to Deal with Telecommunication Networks
Abstract. Detection and isolation of failures in large and complex systems such as telecommunication networks are crucial and challenging tasks. The problem considered here is that...
Laurence Rozé, Marie-Odile Cordier
GIS
2010
ACM
13 years 8 months ago
Efficiently locating photographs in many panoramas
We present a method for efficient and reliable geo-positioning of images. It relies on image-based matching of the query images onto a trellis of existing images that provides acc...
Michael Kroepfl, Yonatan Wexler, Eyal Ofek