Sciweavers

24529 search results - page 4841 / 4906
» Computing on Authenticated Data
Sort
View
ATAL
2010
Springer
13 years 11 months ago
Multi robotic exploration with communication requirement to a fixed base station
d Abstract) Piyoosh Mukhija IIIT Hyderabad Rahul Sawhney IIIT Hyderabad K Madhava Krishna IIIT Hyderabad We present an algorithm for multi robotic exploration of an unknown terrai...
Piyoosh Mukhija, Rahul Sawhney, K. Madhava Krishna
ATAL
2010
Springer
13 years 11 months ago
Hybrid transitive trust mechanisms
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For example, the anonymity of transactions on the Internet c...
Jie Tang, Sven Seuken, David C. Parkes
CEC
2010
IEEE
13 years 11 months ago
Evolutionary layered hypernetworks for identifying microRNA-mRNA regulatory modules
Abstract-- Exploring microRNA (miRNA) and mRNA regulatory interactions may give new insights into diverse biological phenomena. While elucidating complex miRNA-mRNA interactions ha...
Soo-Jin Kim, JungWoo Ha, Bado Lee, Byoung-Tak Zhan...
CLEF
2010
Springer
13 years 11 months ago
The Robot Vision Track at ImageCLEF 2010
This paper describes the robot vision track that has been proposed to the ImageCLEF 2010 participants. The track addressed the problem of visual place classification, with a specia...
Andrzej Pronobis, Marco Fornoni, Henrik I. Christe...
CIDR
2009
167views Algorithms» more  CIDR 2009»
13 years 11 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...
« Prev « First page 4841 / 4906 Last » Next »