Sciweavers

12637 search results - page 112 / 2528
» Security for Extensible Systems
Sort
View
JCP
2006
173views more  JCP 2006»
13 years 9 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
AGENTS
2001
Springer
14 years 1 months ago
Learning structured reactive navigation plans from executing MDP navigation policies
Autonomous robots, such as robot office couriers, need navigation routines that support flexible task execution and effective action planning. This paper describes XFRMLEARN, a s...
Michael Beetz, Thorsten Belker
GIS
2008
ACM
13 years 10 months ago
DRM policies for web map service
Open Digital Rights Language (ODRL) is an extensible language for specifying Rights Policy in the context of Digital Rights Management (DRM) applications. The OpenGIS® Web Map Se...
Alban Gabillon, Patrick Capolsini
IVC
2008
93views more  IVC 2008»
13 years 9 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang
PVLDB
2010
114views more  PVLDB 2010»
13 years 7 months ago
Peer coordination through distributed triggers
This is a demonstration of data coordination in a peer data management system through the employment of distributed triggers. The latter express in a declarative manner individual...
Verena Kantere, Maher Manoubi, Iluju Kiringa, Timo...