Sciweavers

1090 search results - page 63 / 218
» Problem Dependent Generalized Prewavelets
Sort
View
IDTRUST
2010
ACM
14 years 4 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
CIKM
2009
Springer
14 years 3 months ago
The effect of negation on sentiment analysis and retrieval effectiveness
We investigate the problem of determining the polarity of sentiments when one or more occurrences of a negation term such as “not” appear in a sentence. The concept of the sco...
Lifeng Jia, Clement T. Yu, Weiyi Meng
COLCOM
2008
IEEE
14 years 3 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
APPROX
2007
Springer
67views Algorithms» more  APPROX 2007»
14 years 3 months ago
Maximum Gradient Embeddings and Monotone Clustering
abstract Manor Mendel1 and Assaf Naor2 1 The Open University of Israel 2 Courant Institute Let (X, dX ) be an n-point metric space. We show that there exists a distribution D over ...
Manor Mendel, Assaf Naor
ICTAC
2007
Springer
14 years 3 months ago
Regular Linear Temporal Logic
We present regular linear temporal logic (RLTL), a logic that generalizes linear temporal logic with the ability to use regular expressions arbitrarily as sub-expressions. Every LT...
Martin Leucker, César Sánchez