Sciweavers

849 search results - page 20 / 170
» Completely Non-malleable Schemes
Sort
View
DASFAA
2006
IEEE
136views Database» more  DASFAA 2006»
14 years 1 months ago
Reuse or Never Reuse the Deleted Labels in XML Query Processing Based on Labeling Schemes
To facilitate the XML query processing, several kinds of labeling schemes have been proposed. Based on the labeling schemes, the ancestordescendant and parent-child relationships i...
Changqing Li, Tok Wang Ling, Min Hu
ICRA
2009
IEEE
149views Robotics» more  ICRA 2009»
14 years 2 months ago
LSH-RANSAC: An incremental scheme for scalable localization
Abstract— This paper addresses the problem of featurebased robot localization in large-size environments. With recent progress in SLAM techniques, it has become crucial for a rob...
Kenichi Saeki, Kanji Tanaka, Takeshi Ueda
TIFS
2010
130views more  TIFS 2010»
13 years 2 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
UAI
1997
13 years 9 months ago
A Scheme for Approximating Probabilistic Inference
This paper describes a class ofprobabilistic approximation algorithms based on bucket elimination which o er adjustable levels of accuracy ande ciency. We analyzethe approximation...
Rina Dechter, Irina Rish
CCGRID
2009
IEEE
13 years 5 months ago
Resource Information Aggregation in Hierarchical Grid Networks
We propose information aggregation as a method for summarizing the resource-related information, used by the task scheduler. Through this method the information of a set of resour...
Panagiotis C. Kokkinos, Emmanouel A. Varvarigos