Sciweavers

16843 search results - page 84 / 3369
» On Generalized Authorization Problems
Sort
View
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 1 months ago
A new method for finding generalized frequent itemsets in generalized association rule mining
Generalized association rule mining is an extension of traditional association rule mining to discover more informative rules, given a taxonomy. In this paper, we describe a forma...
Kritsada Sriphaew, Thanaruk Theeramunkong
TIT
2010
144views Education» more  TIT 2010»
13 years 2 months ago
Generalized and doubly generalized LDPC codes with random component codes for the binary erasure channel
In this paper, a method for the asymptotic analysis of generalized low-density parity-check (GLDPC) codes and doubly generalized low-density parity-check (D-GLDPC) codes over the b...
Enrico Paolini, Marc P. C. Fossorier, Marco Chiani
CORR
2000
Springer
87views Education» more  CORR 2000»
13 years 8 months ago
Security Policy Consistency
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira, Pau...
DICTA
2003
13 years 9 months ago
FNS, CFNS and HEIV: Extending Three Vision Parameter Estimation Methods
Estimation of parameters from image tokens is a central problem in computer vision. FNS, CFNS and HEIV are three recently developed methods for solving special but important cases ...
Wojciech Chojnacki, Michael J. Brooks, Anton van d...
LATIN
2010
Springer
14 years 3 months ago
Radix Cross-Sections for Length Morphisms
We prove that the radix cross-section of a rational set for a length morphism, and more generally for a rational function from a free monoid into N, is rational, a property that d...
Sylvain Lombardy, Jacques Sakarovitch