Sciweavers

16513 search results - page 3202 / 3303
» Numerical Analysis Methods
Sort
View
119
Voted
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 8 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
148
Voted
ASWEC
2006
IEEE
15 years 8 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
127
Voted
FOCS
2006
IEEE
15 years 8 months ago
On the Quantum Query Complexity of Local Search in Two and Three Dimensions
The quantum query complexity of searching for local optima has been a subject of much interest in the recent literature. For the d-dimensional grid graphs, the complexity has been...
Xiaoming Sun, Andrew Chi-Chih Yao
114
Voted
INFOCOM
2006
IEEE
15 years 8 months ago
Minimum User-Perceived Interference Routing in Service Composition
— Service Composition is a promising technology for providing on-demand services in dynamic and loosely coupled peerto-peer (P2P) networks. Because of system dynamics, such as th...
Li Xiao, Klara Nahrstedt
104
Voted
IROS
2006
IEEE
107views Robotics» more  IROS 2006»
15 years 8 months ago
Image Mapping and Visual Attention on a Sensory Ego-Sphere
Abstract— The Sensory Ego-Sphere (SES) is a short-term memory for a robot in the form of an egocentric, tessellated, spherical, sensory-motor map of the robot’s locale. This pa...
Katherine Achim Fleming, Richard Alan Peters II, R...
« Prev « First page 3202 / 3303 Last » Next »