Sciweavers

1734 search results - page 175 / 347
» What works
Sort
View
ICDT
2005
ACM
95views Database» more  ICDT 2005»
14 years 4 months ago
Semantics of Data Streams and Operators
What does a data stream mean? Much of the extensive work on query operators and query processing for data streams has proceeded without the benefit of an answer to this question. ...
David Maier, Jin Li, Peter A. Tucker, Kristin Tuft...
ATAL
2008
Springer
14 years 22 days ago
Cost-based BDI plan selection for change propagation
Software maintenance is responsible for as much as two thirds of the cost of any software, and is consequently an important research area. In this paper we focus on the change pro...
Khanh Hoa Dam, Michael Winikoff
ICIP
2006
IEEE
15 years 12 days ago
Determining Achievable Rates for Secure, Zero Divergence, Steganography
In steganography (the hiding of data into innocuous covers for secret communication) it is difficult to estimate how much data can be hidden while still remaining undetectable. To...
Kenneth Sullivan, Kaushal Solanki, B. S. Manjunath...
WWW
2003
ACM
14 years 11 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
CVPR
2010
IEEE
14 years 4 months ago
Secrets of Optical Flow Estimation and Their Principles
The accuracy of optical flow estimation algorithms has been improving steadily as evidenced by results on the Middlebury optical flow benchmark. The typical formulation, however...
Deqing Sun, Stefan Roth, Michael Black