Sciweavers

1747 search results - page 36 / 350
» Long Range Dependence
Sort
View
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
13 years 12 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
ACL
2003
13 years 11 months ago
Unsupervised Learning of Dependency Structure for Language Modeling
This paper presents a dependency language model (DLM) that captures linguistic constraints via a dependency structure, i.e., a set of probabilistic dependencies that express the r...
Jianfeng Gao, Hisami Suzuki
ICDE
2003
IEEE
120views Database» more  ICDE 2003»
14 years 11 months ago
Broadcasting Dependent Data for Ordered Queries without Replication in a Multi-Channel Mobile Environment
In several mobile applications, the data items broadcast are dependent upon one another. However, most prior studies on broadcasting dependent data mainly consider single broadcas...
Jiun-Long Huang, Ming-Syan Chen, Wen-Chih Peng
PRDC
2005
IEEE
14 years 3 months ago
Development of Dependable Real-Time Systems with Zerberus
Although the main fault-tolerance techniques are known for a long time, there exists no consistent approach for implementing dependable applications in the sense that the fault-to...
Christian Buckl, Alois Knoll, Gerhard Schrott
ACSC
2006
IEEE
14 years 4 months ago
Identifying refactoring opportunities by identifying dependency cycles
The purpose of refactoring is to improve the quality of a software system by changing its internal design so that it is easier to understand or modify, or less prone to errors and...
Hayden Melton, Ewan D. Tempero