Sciweavers

1017 search results - page 25 / 204
» A General Model for Authenticated Data Structures
Sort
View
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
14 years 9 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
GBRPR
2007
Springer
14 years 16 days ago
Generalized vs Set Median Strings for Histogram-Based Distances: Algorithms and Classification Results in the Image Domain
We compare different statistical characterizations of a set of strings, for three different histogram-based distances. Given a distance, a set of strings may be characterized by it...
Christine Solnon, Jean-Michel Jolion
WWW
2006
ACM
14 years 9 months ago
Symmetrically exploiting XML
Path expressions are the principal means of locating data in a hierarchical model. But path expressions are brittle because they often depend on the structure of data and break if...
Shuohao Zhang, Curtis E. Dyreson
SACMAT
2010
ACM
14 years 1 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
ISTA
2004
13 years 10 months ago
TransM: A Structured Document Transformation Model
: We present in this paper a transformation model for structured documents. TransM is a new model that deals with specified documents, where the structure conforms to a predefined ...
Nouhad Amaneddine, Jean Paul Bahsoun, Jean-Paul Bo...