Sciweavers

870 search results - page 72 / 174
» Constructions for Difference Triangle Sets
Sort
View
120
Voted
CSFW
2006
IEEE
15 years 9 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi
131
Voted
IJCNN
2006
IEEE
15 years 9 months ago
Common Subset Selection of Inputs in Multiresponse Regression
— We propose the Multiresponse Sparse Regression algorithm, an input selection method for the purpose of estimating several response variables. It is a forward selection procedur...
Timo Similä, Jarkko Tikka
121
Voted
CONIELECOMP
2005
IEEE
15 years 9 months ago
Approximate Searching on Compressed Text
The approximate searching problem on compressed text tries to find all the matches of a pattern in a compressed text, without decompressing it and considering that the match of th...
Carlos Avendaño Pérez, Claudia Fereg...
126
Voted
ICMCS
2005
IEEE
104views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Spherical Harmonics Descriptor for 2D-Image Retrieval
In this paper, spherical harmonics are proposed as shape descriptors for 2d images. We introduce the concept of connectivity; 2d images are decomposed using connectivity which is ...
Atul Sajjanhar, Guojun Lu, Dengsheng Zhang
QSIC
2005
IEEE
15 years 9 months ago
Formal Fault Tree Analysis of State Transition Systems
Fault Tree Analysis (FTA) is a traditional deductive safety analysis technique that is applied during the system design stage. However, traditional FTA does not consider transitio...
Jianwen Xiang, Kazuhiro Ogata