Sciweavers

1053 search results - page 182 / 211
» On k-Path Covers and their applications
Sort
View
WPES
2003
ACM
14 years 4 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
EMISA
2006
Springer
14 years 2 months ago
On Design Principles for Realizing Adaptive Service Flows with BPEL
Abstract: Web service technology offers a promising approach for realizing enterprisewide and cross-organizational business applications. With the Business Process Execution Langua...
Manfred Reichert, Stefanie Rinderle
DLOG
1996
14 years 15 days ago
Can Description Logics Be Used in Real-Life Knowledge-Based Systems?
In 1995, I nished my Ph.D. project which was focused on the selection of adequate Knowledge-Representation Systems (KRSs) for research applications. When I started working at the ...
Piet-Hein Speel
CN
2010
95views more  CN 2010»
13 years 11 months ago
Loop-free alternates and not-via addresses: A proper combination for IP fast reroute?
The IETF currently discusses fast reroute mechanisms for IP networks (IP FRR). IP FRR accelerates the recovery in case of network element failures and avoids micro-loops during re...
Michael Menth, Matthias Hartmann, Rüdiger Mar...
CLASSIFICATION
2006
108views more  CLASSIFICATION 2006»
13 years 11 months ago
The Practice of Cluster Analysis
Abstracts "Mixtures at the Interface" David Scott, Rice University Mixture modeling provides an effective framework for complex, high-dimensional data. The potential of m...
Jon R. Kettenring