Sciweavers

2584 search results - page 414 / 517
» On the Forward Checking Algorithm
Sort
View
WOA
2010
13 years 7 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
ICDM
2009
IEEE
150views Data Mining» more  ICDM 2009»
13 years 7 months ago
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
Xiao Yu, Lu An Tang, Jiawei Han
CDC
2010
IEEE
129views Control Systems» more  CDC 2010»
13 years 4 months ago
A symbolic approach to controlling piecewise affine systems
Abstract-- We present a computational framework for automatic synthesis of a feedback control strategy for a piecewise affine (PWA) system from a specification given as a Linear Te...
Jana Tumova, Boyan Yordanov, Calin Belta, Ivana Ce...
PVLDB
2010
135views more  PVLDB 2010»
13 years 4 months ago
Efficient Skyline Evaluation over Partially Ordered Domains
Although there has been a considerable body of work on skyline evaluation in multidimensional data with totally ordered attribute domains, there are only a few methods that consid...
Shiming Zhang, Nikos Mamoulis, Ben Kao, David Wai-...
ESORICS
2011
Springer
12 years 9 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...