Sciweavers

2043 search results - page 389 / 409
» The Limits of Querying Ontologies
Sort
View
IMCS
2007
144views more  IMCS 2007»
13 years 7 months ago
On the imbalance of the security problem space and its expected consequences
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
Konstantin Beznosov, Olga Beznosova
SENSYS
2010
ACM
13 years 5 months ago
Mapping the urban wireless landscape with Argos
Passive monitoring is an important tool for measuring, troubleshooting, and protecting modern wireless networks. To date, WiFi monitoring has focused primarily on indoor settings ...
Ian Rose, Matt Welsh
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
SAS
2012
Springer
208views Formal Methods» more  SAS 2012»
11 years 10 months ago
Finding Non-terminating Executions in Distributed Asynchronous Programs
Programming distributed and reactive asynchronous systems is complex due to the lack of synchronization between concurrently executing tasks, and arbitrary delay of message-based c...
Michael Emmi, Akash Lal
CVPR
2006
IEEE
14 years 9 months ago
SVM-KNN: Discriminative Nearest Neighbor Classification for Visual Category Recognition
We consider visual category recognition in the framework of measuring similarities, or equivalently perceptual distances, to prototype examples of categories. This approach is qui...
Alexander C. Berg, Hao Zhang 0003, Jitendra Malik,...