Sciweavers

1273 search results - page 160 / 255
» Recovery from
Sort
View
COMPSAC
2005
IEEE
13 years 10 months ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin
PST
2008
13 years 9 months ago
Encoding the Program Correctness Proofs as Programs in PCC Technology
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inh...
Heidar Pirzadeh, Danny Dubé
FLAIRS
2001
13 years 9 months ago
A Background Layer of Health Monitoring and Error Handling for ObjectAgent
ObjectAgent is an agent-based, message-passing software architecture that utilizes natural language processing to provide autonomous control to complex systems. As a form of distr...
Joseph B. Mueller, Derek M. Surka, Joy J. Lin
WSCG
2004
192views more  WSCG 2004»
13 years 9 months ago
Fast Segmentation and Modeling of Range Data Via Steerable Pyramid and Superquadrics
This paper focuses on a fast and effective model for range images segmentation and modeling. The first phase is based on the well-known Simoncelli's steerable pyramid, useful...
Vittoria Bruni, Domenico Vitulano, Umberto Manisca...
SERP
2003
13 years 9 months ago
Performance of Service-Discovery Architectures in Response to Node Failures
Current trends suggest future software systems will rely on service-discovery protocols to combine and recombine distributed services dynamically in reaction to changing condition...
Christopher Dabrowski, Kevin L. Mills, Andrew L. R...