Sciweavers

1663 search results - page 97 / 333
» Computer Security in the Real World
Sort
View
CVPR
2010
IEEE
13 years 7 months ago
Efficient computation of robust low-rank matrix approximations in the presence of missing data using the L1 norm
The calculation of a low-rank approximation of a matrix is a fundamental operation in many computer vision applications. The workhorse of this class of problems has long been the ...
Anders Eriksson, Anton van den Hengel
CJ
2004
77views more  CJ 2004»
13 years 8 months ago
Smart Messages: A Distributed Computing Platform for Networks of Embedded Systems
In this paper, we present the design and implementation of Smart Messages, a distributed computing platform for networks of embedded systems based on execution migration. A Smart ...
Porlin Kang, Cristian Borcea, Gang Xu, Akhilesh Sa...
ATAL
2005
Springer
14 years 2 months ago
A real-world approach to secure and trusted negotiation in MASs
The problem of providing tools to support legally valid negotiations between agents is becoming more and more critical. Agents are supposed to perform crucial tasks autonomously; ...
Roberto Bianchi, Andrea Fontana, Federico Bergenti
ICTAI
2006
IEEE
14 years 3 months ago
Computing Horn Strong Backdoor Sets Thanks to Local Search
In this paper a new approach for computing Strong Backdoor sets of boolean formula in conjunctive normal form (CNF) is proposed. It makes an original use of local search technique...
Lionel Paris, Richard Ostrowski, Pierre Siegel, La...
METAINFORMATICS
2004
Springer
14 years 2 months ago
Looking Beyond Computer Applications: Investigating Rich Structures
Spatial structure supporting applications offer an abstract level of what can be found in the real world. However, in many systems, objects are aligned straight, rotation is not p...
Claus Atzenbeck, Peter J. Nürnberg