Sciweavers

2299 search results - page 311 / 460
» Logical Data Expiration
Sort
View
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 10 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
FOSAD
2005
Springer
15 years 10 months ago
Formal Methods for Smartcard Security
Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards ...
Gilles Barthe, Guillaume Dufay
FSKD
2005
Springer
95views Fuzzy Logic» more  FSKD 2005»
15 years 10 months ago
The Fuzzy Mega-cluster: Robustifying FCM by Scaling Down Memberships
A new robust clustering scheme based on fuzzy c-means is proposed and the concept of a fuzzy mega-cluster is introduced in this paper. The fuzzy mega-cluster is conceptually simila...
Amit Banerjee, Rajesh N. Davé
FSKD
2005
Springer
267views Fuzzy Logic» more  FSKD 2005»
15 years 10 months ago
Preventing Meaningless Stock Time Series Pattern Discovery by Changing Perceptually Important Point Detection
Discovery of interesting or frequently appearing time series patterns is one of the important tasks in various time series data mining applications. However, recent research critic...
Tak-Chung Fu, Fu-Lai Chung, Robert W. P. Luk, Chak...
FSKD
2005
Springer
212views Fuzzy Logic» more  FSKD 2005»
15 years 10 months ago
Application of Fuzzy Similarity to Prediction of Epileptic Seizures Using EEG Signals
The prediction of epileptic seizures is a very attractive issue for all patients suffering from epilepsy in EEG (electroencephalograph) signals. It can assist to develop an interve...
Xiaoli Li, Xin Yao