Sciweavers

1092 search results - page 163 / 219
» Located Operators
Sort
View
CIDR
2007
165views Algorithms» more  CIDR 2007»
13 years 11 months ago
A Black-Box Approach to Query Cardinality Estimation
We present a “black-box” approach to estimating query cardinality that has no knowledge of query execution plans and data distribution, yet provides accurate estimates. It doe...
Tanu Malik, Randal C. Burns, Nitesh V. Chawla
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 11 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
LREC
2008
193views Education» more  LREC 2008»
13 years 11 months ago
Automated Subject Induction from Query Keywords through Wikipedia Categories and Subject Headings
This paper addresses a novel approach that integrates two different types of information resources: the World Wide Web and libraries. This approach is based on a hypothesis: advan...
Yoji Kiyota, Noriyuki Tamura, Satoshi Sakai, Hiros...
CSREASAM
2006
13 years 11 months ago
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing
A mobile ad hoc network is a self-organizing network that relies on the cooperation of participating nodes in order to function properly. In this network, mobile users arrive withi...
Ebrahim Khosravi, Brandy Tyson
DAIS
2006
13 years 11 months ago
Mobile Process Description and Execution
Abstract. Mobile devices are increasingly aware of their respective locations and vicinity and tend to communicate rather loosely with each other; therefore asynchronous communicat...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...