Sciweavers

3413 search results - page 609 / 683
» New Support Vector Algorithms
Sort
View
ASPDAC
2004
ACM
107views Hardware» more  ASPDAC 2004»
14 years 2 months ago
Minimization of the expected path length in BDDs based on local changes
— In many verification tools methods for functional simulation based on reduced ordered Binary Decision Diagrams (BDDs) are used. The evaluation time for a BDD can be crucial an...
Rüdiger Ebendt, Wolfgang Günther, Rolf D...
WPES
2004
ACM
14 years 2 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
CAISE
2004
Springer
14 years 2 months ago
Ranked Matching for Service Descriptions using DAML-S
Abstract. The vision of Semantic Web services is that computer systems shall find eligible services autonomously. This can be realised with providing semantic description about ad...
Michael C. Jaeger, Stefan Tang
INFOCOM
2003
IEEE
14 years 2 months ago
cing: Measuring Network-Internal Delays using only Existing Infrastructure
Abstract— Several techniques have been proposed for measuring network-internal delays. However, those that rely on router responses have questionable performance, and all propose...
Kostas G. Anagnostakis, Michael Greenwald, Raphael...
EUROSYS
2010
ACM
14 years 2 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry