Sciweavers

811 search results - page 91 / 163
» When Novelty Is Not Enough
Sort
View
MIS
1998
Springer
103views Multimedia» more  MIS 1998»
14 years 1 months ago
NETCICATS: Network-Conscious Image Compression and Transmission System
NETCICATS is a software system for empirically evaluating network-conscious image compression, an approach that does not simply optimize compression, but which optimizes overall pe...
Sami Iren, Paul D. Amer, Phillip T. Conrad
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
14 years 1 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
14 years 29 days ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi
ATAL
1997
Springer
14 years 29 days ago
Approximate Reasoning about Combined Knowledge
Abstract. Just as cooperation in multi-agent systems is a central issue for solving complex tasks, so too is the ability for an intelligent agent to reason about combined knowledge...
Frédéric Koriche
CIKM
1997
Springer
14 years 28 days ago
Learning Belief Networks from Data: An Information Theory Based Approach
This paper presents an efficient algorithm for learning Bayesian belief networks from databases. The algorithm takes a database as input and constructs the belief network structur...
Jie Cheng, David A. Bell, Weiru Liu