Sciweavers

3557 search results - page 665 / 712
» Reviews
Sort
View
CSREASAM
2003
13 years 9 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
DLOG
2003
13 years 9 months ago
Conceptual Modeling with Description Logics
The purpose of the chapter is to help someone familiar with DLs to understand the issues involved in developing an ontology for some universe of discourse, which is to become a co...
Alexander Borgida, Ronald J. Brachman
I3E
2003
77views Business» more  I3E 2003»
13 years 9 months ago
Who are the Internet Content Providers?
: The Internet continues its growth as a medium for the sale of goods and services – and yet, although it would seem that digital content was one of the most obvious products for...
Cornelia C. Krueger, Paula M. C. Swatman
SCS
2004
13 years 9 months ago
The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation
The HEAT/ACT project consists of replacing the conventional mechanical flight control system of a helicopter with a fly-by-wire system. With such a project, the safety concerns ar...
Paul Chinneck, David Pumfrey, John McDermid
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
13 years 9 months ago
Active Mining of Data Streams
Most previously proposed mining methods on data streams make an unrealistic assumption that "labelled" data stream is readily available and can be mined at anytime. Howe...
Wei Fan, Yi-an Huang, Haixun Wang, Philip S. Yu