Sciweavers

1239 search results - page 225 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
PRDC
2000
IEEE
14 years 1 days ago
Transient errors and rollback recovery in LZ compression
This paper analyzes the data integrity of one of the most widely used lossless data compression techniques, Lempel-Ziv (LZ) compression. In this algorithm, because the data recons...
Wei-Je Huang, Edward J. McCluskey
ICVS
1999
Springer
13 years 12 months ago
Face-Tracking and Coding for Video Compression
While computing power and transmission bandwidth have both been steadily increasing over the last few years, bandwidth rather than processing power remains the primary bottleneck f...
William E. Vieux, Karl Schwerdt, James L. Crowley
ISD
1999
Springer
262views Database» more  ISD 1999»
13 years 12 months ago
Spatial Pictogram Enhanced Conceptual Data Models and Their Translation to Logical Data Models
The successful development of any geographic information system project needs the careful design and implementation of spatial databases via conceptual and logical data-modeling. T...
Shashi Shekhar, Ranga Raju Vatsavai, Sanjay Chawla...
ATAL
2009
Springer
13 years 11 months ago
Norm-based behaviour modification in BDI agents
While there has been much work on developing frameworks and models of norms and normative systems, consideration of the impact of norms on the practical reasoning of agents has at...
Felipe Rech Meneguzzi, Michael Luck
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
13 years 11 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio