Sciweavers

5220 search results - page 930 / 1044
» Changing Persistent Applications
Sort
View
ESWA
2008
123views more  ESWA 2008»
15 years 3 months ago
Computing context-dependent temporal diagnosis in complex domains
Over the years, many Artificial Intelligence (AI) approaches have dealt with the diagnosis problem and its application in complex environments such as medical domains. Model-Based...
José M. Juárez, Manuel Campos, Jos&e...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 2 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
MAGS
2010
97views more  MAGS 2010»
15 years 2 months ago
Towards reliable multi-agent systems: An adaptive replication mechanism
Abstract. Distributed cooperative applications (e.g., e-commerce) are now increasingly being designed as a set of autonomous entities, named agents, which interact and coordinate (...
Zahia Guessoum, Jean-Pierre Briot, Nora Faci, Oliv...
PVLDB
2010
342views more  PVLDB 2010»
15 years 2 months ago
CRIUS: User-Friendly Database Design
Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
Li Qian, Kristen LeFevre, H. V. Jagadish
SCN
2010
Springer
138views Communications» more  SCN 2010»
15 years 2 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov