Sciweavers

22121 search results - page 4248 / 4425
» Modeling annotated data
Sort
View
FOCS
2007
IEEE
14 years 4 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 4 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
IDEAS
2007
IEEE
135views Database» more  IDEAS 2007»
14 years 4 months ago
Bitmap Index Design Choices and Their Performance Implications
Historically, bitmap indexing has provided an important database capability to accelerate queries. However, only a few database systems have implemented these indexes because of t...
Elizabeth J. O'Neil, Patrick E. O'Neil, Kesheng Wu
IEEESCC
2007
IEEE
14 years 4 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
IROS
2007
IEEE
128views Robotics» more  IROS 2007»
14 years 4 months ago
EMG-based teleoperation of a robot arm using low-dimensional representation
Abstract— In robot teleoperation scenarios, the interface between the user and the robot is undoubtedly of high importance. In this paper, electromyographic (EMG) signals from mu...
Panagiotis K. Artemiadis, Kostas J. Kyriakopoulos
« Prev « First page 4248 / 4425 Last » Next »