Sciweavers

813 search results - page 123 / 163
» Pipeline-centric provenance model
Sort
View
UAI
2003
13 years 9 months ago
Renewal Strings for Cleaning Astronomical Databases
Large astronomical databases obtained from sky surveys such as the SuperCOSMOS Sky Surveys (SSS) invariably suffer from spurious records coming from artefactual effects of the t...
Amos J. Storkey, Nigel C. Hambly, Christopher K. I...
ICMAS
1998
13 years 9 months ago
Heterogeneity, Stability, and Efficiency in Distributed Systems
This paper explores the increasing the heterogeneity of an agent population to stabilize decentralized systems by adding bias terms to each agent's expected payoffs. Two appr...
James D. Thomas, Katia P. Sycara
TREC
2007
13 years 9 months ago
MultiText Legal Experiments at TREC 2007
For the legal track we used the Wumpus search engine and investigated several methods that have proven successful in other domains, including cover density ranking and Okapi BM25 ...
Stefan Büttcher, Charles L. A. Clarke, Gordon...
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
CSL
2010
Springer
13 years 8 months ago
Quantified Differential Dynamic Logic for Distributed Hybrid Systems
Abstract. We address a fundamental mismatch between the combinations of dynamics that occur in complex physical systems and the limited kinds of dynamics supported in analysis. Mod...
André Platzer