Sciweavers

204 search results - page 26 / 41
» aim 1998
Sort
View
VLDB
1998
ACM
134views Database» more  VLDB 1998»
14 years 24 days ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
WWCA
1998
Springer
14 years 24 days ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
ICALP
1998
Springer
14 years 6 days ago
A Neuroidal Architecture for Cognitive Computation
An architecture is described for designing systems that acquire and manipulate large amounts of unsystematized, or so-called commonsense, knowledge. Its aim is to exploit to the fu...
Leslie G. Valiant
AAAI
1998
13 years 10 months ago
Using Arc Weights to Improve Iterative Repair
One of the surprising findings from the study of CNF satisfiability in the 1990's has been the success of iterative repair techniques, and in particular of weighted iterative...
John Thornton, Abdul Sattar
ACL
1998
13 years 10 months ago
Project for Production of Closed-Caption TV Programs for the Hearing Impaired
We describe an on-going project whose primary aim is to establish the technology of producing closed captions for TV news programs efficiently using natural language processing an...
Takahiro Wakao, Eiji Sawamura, Terumasa Ehara, Ich...