Sciweavers

461 search results - page 14 / 93
» Bounds for Validation
Sort
View
ICDM
2010
IEEE
109views Data Mining» more  ICDM 2010»
13 years 8 months ago
Term Filtering with Bounded Error
Abstract--In this paper, we consider a novel problem referred to as term filtering with bounded error to reduce the term (feature) space by eliminating terms without (or with bound...
Zi Yang, Wei Li, Jie Tang, Juanzi Li
ACSAC
2002
IEEE
14 years 3 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
CNSR
2007
IEEE
158views Communications» more  CNSR 2007»
14 years 21 days ago
Bounding the Information Collection Performance of Wireless Sensor Network Routing
Wireless sensor networks have mainly been designed for information-collecting purposes, such as habitat monitoring, product process tracing, battlefield surveillance, etc. In orde...
Qinghua Wang, Tingting Zhang, Stefan Pettersson
CRYPTO
2004
Springer
91views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
Non-interactive Timestamping in the Bounded Storage Model
A timestamping scheme is non-interactive if a stamper can stamp a document without communicating with any other player. The only communication done is at validation time. Non-Inte...
Tal Moran, Ronen Shaltiel, Amnon Ta-Shma
ASPDAC
2007
ACM
139views Hardware» more  ASPDAC 2007»
14 years 2 months ago
Deeper Bound in BMC by Combining Constant Propagation and Abstraction
ound in BMC by Combining Constant Propagation and Abstraction Roy Armoni, Limor Fix1 , Ranan Fraer1 , Tamir Heyman1,3 , Moshe Vardi2 , Yakir Vizel1 , Yael Zbar1 1 Logic and Validat...
Roy Armoni, Limor Fix, Ranan Fraer, Tamir Heyman, ...