Sciweavers

415 search results - page 69 / 83
» Propagating functional dependencies with conditions
Sort
View
HOST
2008
IEEE
14 years 2 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
ICDM
2008
IEEE
120views Data Mining» more  ICDM 2008»
14 years 2 months ago
Anti-monotonic Overlap-Graph Support Measures
In graph mining, a frequency measure is anti-monotonic if the frequency of a pattern never exceeds the frequency of a subpattern. The efficiency and correctness of most graph pat...
Toon Calders, Jan Ramon, Dries Van Dyck
ALGOSENSORS
2004
Springer
14 years 1 months ago
Multi: A Hybrid Adaptive Dissemination Protocol for Wireless Sensor Networks
Abstract. Data dissemination (routing) is a basic function in wireless sensor networks. Dissemination algorithms for those networks depend on the characteristics of the application...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
ICA
2004
Springer
14 years 1 months ago
On the FIR Inversion of an Acoustical Convolutive Mixing System: Properties and Limitations
In this paper we address the problem of Least-Squares (LS) optimal FIR inverse-filtering of an convolutive mixing system, given by a set of acoustic impulse responses (AIRs). The ...
Markus Hofbauer
ATAL
2003
Springer
14 years 1 months ago
On optimal outcomes of negotiations over resources
We analyse scenarios in which self-interested agents negotiate with each other in order to agree on deals to exchange resources. We consider two variants of the framework, one whe...
Ulrich Endriss, Nicolas Maudet, Fariba Sadri, Fran...