Sciweavers

1201 search results - page 231 / 241
» On the cardinality of fuzzy sets
Sort
View
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
13 years 10 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
DASFAA
2008
IEEE
94views Database» more  DASFAA 2008»
13 years 9 months ago
Efficient Algorithms for Node Disjoint Subgraph Homeomorphism Determination
Recently, great efforts have been dedicated to researches on the management of large-scale graph-based data, where node disjoint subgraph homeomorphism relation between graphs has ...
Yanghua Xiao, Wentao Wu, Wei Wang 0009, Zhenying H...
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
ADIS
2001
13 years 8 months ago
A controlled experiment for corroborating the usefulness of class diagram metrics at the early phases of OO developments
The quality of class diagrams is critical because it has a great influence on the quality of the object oriented information system (OOIS) which are finally delivered. This fact mo...
Marcela Genero, José A. Olivas, Mario Piatt...
IJIT
2004
13 years 8 months ago
Mobile Robot Navigation Using Local Model Networks
Developing techniques for mobile robot navigation constitutes one of the major trends in the current research on mobile robotics. This paper develops a local model network (LMN) fo...
Hamdi A. Awad, Mohamed A. Al-Zorkany