Sciweavers

664 search results - page 102 / 133
» Solution to the Counterfeit Coin Problem and its Generalizat...
Sort
View
KBSE
2002
IEEE
14 years 1 months ago
Adapting Applications on the Fly
Traditionally, an application has to be stopped to be adapted. This approach is not suitable for critical systems that have to be non-stop and highly available like bank, internet...
Abdelmadjid Ketfi, Noureddine Belkhatir, Pierre-Yv...
MOBICOM
2009
ACM
14 years 1 months ago
Understanding cross-band interference in unsynchronized spectrum access
We consider the problem of cross-band interference when devices from the same or different networks share radio spectrum. Cross-band interference occurs when unsynchronized trans...
Wei Hou, Lei Yang, Lin Zhang, Xiuming Shan, Heathe...
LANMR
2007
13 years 10 months ago
Handling Exceptions in nonmonotonic reasoning
Abstract We introduce some differences in the style defeasible information is represented and inferences are made in nonmonotonic reasoning. These, at first sight harmless, chang...
Marcelino C. Pequeno, Rodrigo de M. S. Veras, Wlad...
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
13 years 10 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
CONCUR
2010
Springer
13 years 8 months ago
On the Compositionality of Round Abstraction
ompositionality of Round Abstraction Abstract Dan R. Ghica and Mohamed N. Menaa University of Birmingham, U.K. We revisit a technique called round abstraction as a solution to the ...
Dan R. Ghica, Mohamed N. Menaa