Sciweavers

2315 search results - page 361 / 463
» Does EigenPalm work
Sort
View
KES
2004
Springer
14 years 1 months ago
comDesk: A Cooperative Assistance Tool Based on P2P Techniques
We have designed and implemented a desktop sharing system based on P2P (peer-to-peer) techniques, named “comDesk,” which enables users to exchange the desktop images as well as...
Motoki Miura, Buntarou Shizuki, Jiro Tanaka
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 1 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
PATMOS
2004
Springer
14 years 1 months ago
Sleepy Stack Reduction of Leakage Power
Leakage power consumption of current CMOS technology is already a great challenge. ITRS projects that leakage power consumption may come to dominate total chip power consumption as...
Jun-Cheol Park, Vincent John Mooney III, Philipp P...
PPSN
2004
Springer
14 years 1 months ago
Evolution of Voronoi-Based Fuzzy Controllers
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. One of the most successful methods to auto...
Carlos Kavka, Marc Schoenauer
PSD
2004
Springer
126views Database» more  PSD 2004»
14 years 1 months ago
Outlier Protection in Continuous Microdata Masking
Abstract. Masking methods protect data sets against disclosure by perturbing the original values before publication. Masking causes some information loss (masked data are not exact...
Josep Maria Mateo-Sanz, Francesc Sebé, Jose...