Sciweavers

306 search results - page 53 / 62
» Framework and Requirements for Management of Topographic Dat...
Sort
View
IH
2001
Springer
14 years 6 days ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
RAID
2001
Springer
14 years 6 days ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
ACMSE
2007
ACM
13 years 11 months ago
Change propagations in the maintenance of kernel-based software with a study on Linux
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
Liguo Yu, Srini Ramaswamy
ATAL
2006
Springer
13 years 11 months ago
Adaptive Pricing for Customers with Probabilistic Valuations
Abstract. In this paper, we examine the problem of choosing discriminatory prices for customers with probabilistic valuations and a seller with indistinguishable copies of a good. ...
Michael Benisch, James Andrews, Norman M. Sadeh
WEBNET
2000
13 years 9 months ago
Conventions for Knowledge Representation via RDF
The Resource Description Framework [RDF] provides a basic model to describe relationships between objects. Ultimately, it is intended to permit the representation, combination and ...
Philippe Martin, Peter W. Eklund