Sciweavers

1220 search results - page 55 / 244
» Guided Data Repair
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
DEXAW
2008
IEEE
161views Database» more  DEXAW 2008»
14 years 3 months ago
Model-Based QoS-Enabled Self-Healing Web Services
Failures during web service execution may depend on a wide variety of causes, such as network faults, server crashes, or application-related errors, such as unavailability of a re...
Olga Nabuco, Riadh Ben Halima, Khalil Drira, Maria...
INFOCOM
2008
IEEE
14 years 3 months ago
Light-Weight Contour Tracking in Wireless Sensor Networks
Abstract—We study the problem of contour tracking with binary sensors, an important problem for monitoring spatial signals and tracking group targets. In particular, we track the...
Xianjin Zhu, Rik Sarkar, Jie Gao, Joseph S. B. Mit...
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Parallel and Distributed Audio Concealment using Nonlocal Sparse Representations
We present a new class of parallel and distributed audio concealment (PDAC) algorithms which recover lost audio packets at the receiver to fight against channel impairment. The m...
Xin Li
ATAL
2007
Springer
14 years 2 months ago
Practical extensions in agent programming languages
This paper proposes programming constructs to improve the practical application of existing BDI-based agent-oriented programming languages that have formal semantics. The proposed...
Mehdi Dastani, Dirk Hobo, John-Jules Ch. Meyer