Sciweavers

438 search results - page 68 / 88
» Three Approaches to Probability Model Selection
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
INFOCOM
2002
IEEE
14 years 14 days ago
Ultrafast Photonic Label Switch for Asynchronous Packets of Variable Length
- This paper describes new optical switching architectures supporting asynchronous variable-length packets. Output line contention is resolved by optical delay line buffers. By int...
Masayuki Murata, Ken-ichi Kitayama
ASSETS
2005
ACM
13 years 9 months ago
Semantic knowledge in word completion
We propose an integrated approach to interactive word-completion for users with linguistic disabilities in which semantic knowledge combines with n-gram probabilities to predict s...
Jianhua Li, Graeme Hirst
ENTCS
2002
88views more  ENTCS 2002»
13 years 7 months ago
Testing Concurrent Java Programs using Randomized Scheduling
The difficulty of finding errors caused by unexpected interleavings of threads in concurrent programs is well known. Model checkers can pinpoint such errors and verify correctness...
Scott D. Stoller
ICASSP
2011
IEEE
12 years 11 months ago
Urban terrain tracking in high clutter with waveform-agility
We consider the problem of tracking a maneuvering target in urban terrain with high clutter. Although multipath has been previously exploited to improve target tracking in complex...
Bhavana Chakraborty, Jun Jason Zhang, Antonia Papa...