Sciweavers

12637 search results - page 112 / 2528
» Security for Extensible Systems
Sort
View
JCP
2006
173views more  JCP 2006»
15 years 2 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
AGENTS
2001
Springer
15 years 7 months ago
Learning structured reactive navigation plans from executing MDP navigation policies
Autonomous robots, such as robot office couriers, need navigation routines that support flexible task execution and effective action planning. This paper describes XFRMLEARN, a s...
Michael Beetz, Thorsten Belker
117
Voted
GIS
2008
ACM
15 years 3 months ago
DRM policies for web map service
Open Digital Rights Language (ODRL) is an extensible language for specifying Rights Policy in the context of Digital Rights Management (DRM) applications. The OpenGIS® Web Map Se...
Alban Gabillon, Patrick Capolsini
IVC
2008
93views more  IVC 2008»
15 years 2 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang
143
Voted
PVLDB
2010
114views more  PVLDB 2010»
15 years 29 days ago
Peer coordination through distributed triggers
This is a demonstration of data coordination in a peer data management system through the employment of distributed triggers. The latter express in a declarative manner individual...
Verena Kantere, Maher Manoubi, Iluju Kiringa, Timo...