Sciweavers

2642 search results - page 97 / 529
» The development of Chez Scheme
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Outlier-aware robust clustering
Clustering is a basic task in a variety of machine learning applications. Partitioning a set of input vectors into compact, wellseparated subsets can be severely affected by the p...
Pedro A. Forero, Vassilis Kekatos, Georgios B. Gia...
INFOCOM
2011
IEEE
13 years 1 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
DOLAP
1998
ACM
14 years 2 months ago
Methodological Framework for Data Warehouse Design
Though designing a data warehouse requires techniques completely different from those adopted for operational systems, no significant effort has been made so far to develop a comp...
Matteo Golfarelli, Stefano Rizzi
PLDI
1998
ACM
14 years 2 months ago
Units: Cool Modules for HOT Languages
A module system ought to enable assembly-line programming using separate compilation and an expressive linking language. Separate compilation allows programmers to develop parts o...
Matthew Flatt, Matthias Felleisen
WETICE
1997
IEEE
14 years 2 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...