Sciweavers

8496 search results - page 1596 / 1700
» Problem Solving and Complex Systems
Sort
View
ICDT
2010
ACM
194views Database» more  ICDT 2010»
14 years 8 days ago
Bag Equivalence of XPath Queries
When a query is evaluated under bag semantics, each answer is returned as many times as it has derivations. Bag semantics has long been recognized as important, especially when ag...
Sara Cohen, Yaacov Y. Weiss
APNOMS
2008
Springer
14 years 8 days ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
ATAL
2008
Springer
14 years 8 days ago
Automated design of scoring rules by learning from examples
Scoring rules are a broad and concisely-representable class of voting rules which includes, for example, Plurality and Borda. Our main result asserts that the class of scoring rul...
Ariel D. Procaccia, Aviv Zohar, Jeffrey S. Rosensc...
CCS
2008
ACM
14 years 7 days ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
3DPVT
2006
IEEE
197views Visualization» more  3DPVT 2006»
14 years 7 days ago
Structured Light Based Reconstruction under Local Spatial Coherence Assumption
3D scanning techniques based on structured light usually achieve robustness against outliers by performing multiple projections to simplify correspondence. However, for cases such...
Hao Li, Raphael Straub, Hartmut Prautzsch
« Prev « First page 1596 / 1700 Last » Next »