Sciweavers

766 search results - page 107 / 154
» Commuting aggregation operators
Sort
View
CCR
2010
133views more  CCR 2010»
13 years 9 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
DPD
2006
98views more  DPD 2006»
13 years 8 months ago
GRACE-based joins on active storage devices
Contemporary long-term storage devices feature powerful embedded processors and sizeable memory buffers. Active Storage Devices (ASD) is the hard disk technology that makes use of ...
Vassilis Stoumpos, Alex Delis
ENTCS
2007
94views more  ENTCS 2007»
13 years 8 months ago
Virtual Organizations in Arigatoni
Arigatoni is a lightweight overlay network that deploys the Global Computing Paradigm over the Internet. Communication for over the behavioral units of the overlay is performed by...
Michel Cosnard, Luigi Liquori, Raphaël Chand
TFS
2008
131views more  TFS 2008»
13 years 8 months ago
A Fuzzy Qualitative Framework for Connecting Robot Qualitative and Quantitative Representations
Abstract-- This paper proposes a novel framework for describing articulated robot kinematics motion with the goal of providing a unified representation by combining symbolic or qua...
Honghai Liu
SAC
2008
ACM
13 years 8 months ago
A software architecture for ontology-driven situation awareness
Human operators of large-scale control systems face the problem of information overload induced by the large amount of information provided by multiple heterogeneous and highlydyn...
Norbert Baumgartner, Werner Retschitzegger, Wielan...