Sciweavers

5365 search results - page 175 / 1073
» Hierarchical Information Maps
Sort
View
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
14 years 3 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
SWS
2004
ACM
14 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ISW
2004
Springer
14 years 3 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
IDA
2003
Springer
14 years 3 months ago
Constructing Hierarchical Rule Systems
Rule systems have failed to attract much interest in large data analysis problems because they tend to be too simplistic to be useful or consist of too many rules for human interpr...
Thomas R. Gabriel, Michael R. Berthold
NLPRS
2001
Springer
14 years 2 months ago
A Hierarchical EM Approach to Word Segmentation
We propose a simple two-level hierarchical probability model for unsupervised word segmentation. By treating words as strings composed of morphemes/phonemes which are themselves c...
Fuchun Peng, Dale Schuurmans