Sciweavers

733 search results - page 82 / 147
» Private inference control
Sort
View
IMC
2004
ACM
14 years 3 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...
PODS
2011
ACM
163views Database» more  PODS 2011»
13 years 1 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
FROCOS
2009
Springer
14 years 4 months ago
Automating Theories in Intuitionistic Logic
Deduction modulo consists in applying the inference rules of a deductive system modulo a rewrite system over terms and formulæ. This is equivalent to proving within a so-called co...
Guillaume Burel
FDG
2009
ACM
14 years 4 months ago
Very fast action selection for parameterized behaviors
In this paper, I will discuss a set of techniques for supporting limited variable binding in behavior-based systems. This adds additional useful expressivity while preserving the ...
Ian Horswill
IUI
2005
ACM
14 years 3 months ago
Interaction techniques using prosodic features of speech and audio localization
We describe several approaches for using prosodic features of speech and audio localization to control interactive applications. This information can be applied to parameter contr...
Alex Olwal, Steven Feiner