Sciweavers

1818 search results - page 274 / 364
» Operant conditioning
Sort
View
127
Voted
CIKM
2006
Springer
15 years 6 months ago
Distributed spatio-temporal similarity search
In this paper we introduce the distributed spatio-temporal similarity search problem: given a query trajectory Q, we want to find the trajectories that follow a motion similar to ...
Demetrios Zeinalipour-Yazti, Song Lin, Dimitrios G...
113
Voted
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 6 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
GFKL
2006
Springer
75views Data Mining» more  GFKL 2006»
15 years 6 months ago
Classification of Contradiction Patterns
Abstract. Solving conflicts between overlapping databases requires an understanding of the reasons that lead to the inconsistencies. Provided that conflicts do not occur randomly b...
Heiko Müller, Ulf Leser, Johann Christoph Fre...
120
Voted
ACSAC
2001
IEEE
15 years 6 months ago
A Regulated Approach to Certificate Management
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Victoria Ungureanu
HUC
2000
Springer
15 years 6 months ago
Event-Driven, Personalizable, Mobile Interactive Spaces
Abstract An infrastructure is currently being deployed for delivering multimedia services using IP endto-end. Mobile devices and application resources, because of their computing c...
Theo Kanter