Sciweavers

734 search results - page 111 / 147
» Narrowing the Narrowing Space
Sort
View
IJUFKS
2002
78views more  IJUFKS 2002»
13 years 7 months ago
On the Security of Microaggregation with Individual Ranking: Analytical Attacks
Microaggregation is a statistical disclosure control technique. Raw microdata (i.e. individual records) are grouped into small aggregates prior to publication. With fixed-size grou...
Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Anna...
LOGCOM
1998
126views more  LOGCOM 1998»
13 years 7 months ago
Engineering AgentSpeak(L): A Formal Computational Model
Perhaps the most successful agent architectures, and certainly the best known, are those based on the Belief-Desire-Intention (BDI) framework. Despite the wealth of research that ...
Mark d'Inverno, Michael Luck
TC
1998
13 years 7 months ago
Using System-Level Models to Evaluate I/O Subsystem Designs
—We describe a system-level simulation model and show that it enables accurate predictions of both I/O subsystem and overall system performance. In contrast, the conventional app...
Gregory R. Ganger, Yale N. Patt
TON
1998
80views more  TON 1998»
13 years 7 months ago
Blocking and nonblocking multirate Clos switching networks
— This paper investigates in detail the blocking and nonblocking behavior of multirate Clos switching networks at the connection/virtual connection level. The results are applica...
Soung C. Liew, Ming-Hung Ng, Cathy W. Chan
TCSV
2002
66views more  TCSV 2002»
13 years 7 months ago
Multiframe blocking-artifact reduction for transform-coded video
A major drawback of block-based still-image or video-compression methods at low rates is the visible block boundaries that are also known as blocking artifacts. Several methods hav...
Bahadir K. Gunturk, Yucel Altunbasak, Russell M. M...