Sciweavers

987 search results - page 26 / 198
» Key Characteristics of Hymns
Sort
View
ASWEC
2006
IEEE
14 years 1 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
ICDE
2005
IEEE
145views Database» more  ICDE 2005»
14 years 1 months ago
Towards Indexing Schemes for Self-Tuning DBMS
Index tuning as part of database tuning is the task of selecting and creating indexes with the goal of reducing query processing times. However, in dynamic environments with vario...
Kai-Uwe Sattler, Eike Schallehn, Ingolf Geist
PCM
2004
Springer
104views Multimedia» more  PCM 2004»
14 years 26 days ago
An Image Retrieval Scheme Using Multi-instance and Pseudo Image Concepts
Abstract. Content-based image search has long been considered a difficult task. Making correct conjectures on the user intention (perception) based on the query images is a critica...
Feng-Cheng Chang, Hsueh-Ming Hang
FM
2009
Springer
101views Formal Methods» more  FM 2009»
14 years 4 days ago
Formal Reasoning about Expectation Properties for Continuous Random Variables
Abstract. Expectation (average) properties of continuous random variables are widely used to judge performance characteristics in engineering and physical sciences. This paper pres...
Osman Hasan, Naeem Abbasi, Behzad Akbarpour, Sofi&...
WOWMOM
2000
ACM
86views Multimedia» more  WOWMOM 2000»
13 years 12 months ago
Real-time prioritized call admission control in a base station scheduler
With the deployment of packetized wireless networks, the need for Quality of Service is becoming increasingly important. In order for QoS to be implemented and e ciently supported...
Jay R. Moorman, John W. Lockwood, Sung-Mo Kang