Sciweavers

4897 search results - page 964 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
SIGMOD
2006
ACM
208views Database» more  SIGMOD 2006»
14 years 8 months ago
Data management for a smart earth: the Swiss NCCR-MICS initiative
The Swiss National Competence Center for Research in mobile Information and Communication Systems (NCCR-MICS or MICS) is one of several research initiatives sponsored by the Swiss...
Karl Aberer, Gustavo Alonso, Donald Kossmann
ACSAC
2007
IEEE
14 years 2 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda
RTCSA
2007
IEEE
14 years 2 months ago
A Continuous Query Index for Processing Queries on RFID Data Stream
RFID middleware systems collect and filter RFID streaming data gathered continuously by numerous readers to process requests from applications. These requests are called continuou...
Jaekwan Park, Bonghee Hong, ChaeHoon Ban
CIVR
2007
Springer
178views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Layout indexing of trademark images
Ensuring the uniqueness of trademark images and protecting their identities are the most important objectives for the trademark registration process. To prevent trademark infringe...
Reinier H. van Leuken, M. Fatih Demirci, Victoria ...
PRIMA
2007
Springer
14 years 1 months ago
Multiagent Planning with Trembling-Hand Perfect Equilibrium in Multiagent POMDPs
Multiagent Partially Observable Markov Decision Processes are a popular model of multiagent systems with uncertainty. Since the computational cost for finding an optimal joint pol...
Yuichi Yabu, Makoto Yokoo, Atsushi Iwasaki