Sciweavers

160 search results - page 22 / 32
» Change Happens!
Sort
View
CIDR
2009
105views Algorithms» more  CIDR 2009»
13 years 11 months ago
Teaching an Old Elephant New Tricks
In recent years, column stores (or C-stores for short) have emerged as a novel approach to deal with read-mostly data warehousing applications. Experimental evidence suggests that...
Nicolas Bruno
FC
2010
Springer
150views Cryptology» more  FC 2010»
13 years 11 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 10 months ago
Joint interpretation of on-board vision and static GPS cartography for determination of correct speed limit
We present here a first prototype of a "Speed Limit Support" Advance Driving Assistance System (ADAS) producing permanent reliable information on the current speed limit...
Alexandre Bargeton, Fabien Moutarde, Fawzi Nashash...
JDCTA
2008
110views more  JDCTA 2008»
13 years 9 months ago
Development and Validation of a New Method for Noninvasive Diagnosis of LUTS
Lower urinary tract symptoms (LUTS) affect selfassessed quality of life. The aim of this study is to acquire useful information of LUTS diagnosis thorough uroflow and urophonograp...
Do-Un Jeong, Wan-Young Chung
JSAC
2010
147views more  JSAC 2010»
13 years 8 months ago
Joint identity-message coding
In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as ...
Lorenzo Keller, Mahdi Jafari Siavoshani, Christina...