Sciweavers

532 search results - page 63 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
JCS
2010
124views more  JCS 2010»
13 years 7 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
KDD
2004
ACM
157views Data Mining» more  KDD 2004»
14 years 2 months ago
On detecting space-time clusters
Detection of space-time clusters is an important function in various domains (e.g., epidemiology and public health). The pioneering work on the spatial scan statistic is often use...
Vijay S. Iyengar
ESANN
2006
13 years 10 months ago
Margin based Active Learning for LVQ Networks
In this article, we extend a local prototype-based learning model by active learning, which gives the learner the capability to select training samples during the model adaptation...
Frank-Michael Schleif, Barbara Hammer, Thomas Vill...
ICPADS
1998
IEEE
14 years 29 days ago
A Comparison of Two Torus-Based K-Coteries
We extend a torus-based coterie structure for distributed mutual exclusion to allow k multiple entries in a critical section. In the original coterie, the system nodes are logical...
S. D. Lang, L. J. Mao
CBMS
2007
IEEE
14 years 3 months ago
Multifaceted Hyperimage-Based Organization and Interaction with Bio-Medical Images
The abundance of complex media-rich information in state-of-the-art bio-medical sciences underlines the importance of paradigms for organizing, searching, browsing, and assimilati...
Rahul Singh, Pierre-Yves Corlobe