Sciweavers

2397 search results - page 55 / 480
» Applications of integer relation algorithms
Sort
View
JOC
2007
133views more  JOC 2007»
13 years 11 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
ICTAI
2002
IEEE
14 years 4 months ago
Data Mining Using Cultural Algorithms and Regional Schemata
In the paper we demonstrate how evolutionary search for functional optima can be used as a vehicle for data mining. That is, in the process of searching for optima in a multi-dime...
Xidong Jin, Robert G. Reynolds
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 11 months ago
Mining relational data through correlation-based multiple view validation
Commercial relational databases currently store vast amounts of real-world data. The data within these relational repositories are represented by multiple relations, which are int...
Hongyu Guo, Herna L. Viktor
CCS
2007
ACM
14 years 5 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
CORR
2007
Springer
151views Education» more  CORR 2007»
13 years 11 months ago
Decision tree modeling with relational views
Data mining is a useful decision support technique that can be used to discover production rules in warehouses or corporate data. Data mining research has made much effort to appl...
Fadila Bentayeb, Jérôme Darmont