Sciweavers

5344 search results - page 1064 / 1069
» Privacy-Preserving Set Operations
Sort
View
TSMC
2010
13 years 4 months ago
A Model for the Integration of Prioritized Knowledge Bases Through Subjective Belief Games
Belief merging is concerned with the integration of several belief bases such that a coherent belief base is developed. Various belief merging models have been developed that use a...
Ebrahim Bagheri, Ali A. Ghorbani
CORR
2011
Springer
142views Education» more  CORR 2011»
13 years 1 months ago
Taming Numbers and Durations in the Model Checking Integrated Planning System
The Model Checking Integrated Planning System (MIPS) has shown distinguished performance in the second and third international planning competitions. With its object-oriented fram...
Stefan Edelkamp
INFOCOM
2011
IEEE
13 years 1 months ago
WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access
Abstract—The high density of WiFi Access Points and large unlicensed RF bandwidth over which they operate makes them good candidates to alleviate cellular network’s limitations...
Tao Jin, Guevara Noubir, Bo Sheng
PDP
2011
IEEE
13 years 1 months ago
Quantifying Thread Vulnerability for Multicore Architectures
Abstract—Continuously reducing transistor sizes and aggressive low power operating modes employed by modern architectures tend to increase transient error rates. Concurrently, mu...
Isil Oz, Haluk Rahmi Topcuoglu, Mahmut T. Kandemir...
BIOINFORMATICS
2011
13 years 1 months ago
RINQ: Reference-based Indexing for Network Queries
We consider the problem of similarity queries in biological network databases. Given a database of networks, similarity query returns all the database networks whose similarity (i...
Günhan Gülsoy, Tamer Kahveci
« Prev « First page 1064 / 1069 Last » Next »