Sciweavers

17789 search results - page 3451 / 3558
» Exceptional Use Cases
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 2 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
EDBT
2009
ACM
156views Database» more  EDBT 2009»
14 years 2 months ago
Efficient skyline retrieval with arbitrary similarity measures
A skyline query returns a set of objects that are not dominated by other objects. An object is said to dominate another if it is closer to the query than the latter on all factors...
Deepak P, Prasad M. Deshpande, Debapriyo Majumdar,...
GIS
2007
ACM
14 years 2 months ago
Pipelined spatial join processing for quadtree-based indexes
Spatial join is an important yet costly operation in spatial databases. In order to speed up the execution of a spatial join, the input tables are often indexed based on their spa...
Walid G. Aref
EPIA
2009
Springer
14 years 2 months ago
Obstacle Detection, Identification and Sharing on a Robotic Soccer Team
When building a representation of the environment for a robot in a multi-agent application, as is the case of robotic soccer, sensor and information fusion of several elements of t...
João Silva, Nuno Lau, António J. R. ...
GLOBECOM
2009
IEEE
14 years 2 months ago
Energy-Efficient Multi-Pipeline Architecture for Terabit Packet Classification
Energy efficiency has become a critical concern in designing high speed packet classification engines for next generation routers. Although TCAM-based solutions can provide high th...
Weirong Jiang, Viktor K. Prasanna
« Prev « First page 3451 / 3558 Last » Next »