Sciweavers

22018 search results - page 4392 / 4404
» or 2004
Sort
View
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 8 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent
GIS
2010
ACM
13 years 8 months ago
Investigation of aggregation effects in vegetation condition monitoring at a national scale
Monitoring vegetation condition is an important issue in the Mediterranean region, in terms of both securing food and preventing fires. Vegetation indices (VIs), mathematical tran...
T. K. Alexandridis, T. Katagis, I. Z. Gitas, N. G....
NLE
2010
127views more  NLE 2010»
13 years 8 months ago
Class-based approach to disambiguating Levin verbs
Lapata and Brew (2004) (hereafter LB04) obtain from untagged texts a statistical prior model that is able to generate class preferences for ambiguous Levin (1993) verbs (hereafter...
Jianguo Li, Chris Brew
SIAMCOMP
2010
94views more  SIAMCOMP 2010»
13 years 8 months ago
Local Monotonicity Reconstruction
We propose a general model of local property reconstruction. Suppose we have a function f on domain Γ, which is supposed to have a particular property P, but may not have the pro...
Michael E. Saks, C. Seshadhri
IMC
2010
ACM
13 years 7 months ago
Internet background radiation revisited
The monitoring of packets destined for reachable, yet unused, Internet addresses has proven to be a useful technique for measuring a variety of specific Internet phenomenon (e.g.,...
Eric Wustrow, Manish Karir, Michael Bailey, Farnam...
« Prev « First page 4392 / 4404 Last » Next »