Sciweavers

1356 search results - page 230 / 272
» Some New Results on Inverse Sorting Problems
Sort
View
SIGMOD
2006
ACM
238views Database» more  SIGMOD 2006»
14 years 9 months ago
Continuous monitoring of top-k queries over sliding windows
Given a dataset P and a preference function f, a top-k query retrieves the k tuples in P with the highest scores according to f. Even though the problem is well-studied in convent...
Kyriakos Mouratidis, Spiridon Bakiras, Dimitris Pa...
AROBOTS
2008
77views more  AROBOTS 2008»
13 years 9 months ago
Extending obstacle avoidance methods through multiple parameter-space transformations
Obstacle avoidance methods approach the problem of mobile robot autonomous navigation by steering the robot in real-time according to the most recent sensor readings, being suitab...
Jose-Luis Blanco, Javier Gonzalez, Juan-Antonio Fe...
CSJM
2007
150views more  CSJM 2007»
13 years 8 months ago
An approach for NL text interpretation
For modeling the interpretation process of NL sentences we use the mechanisms implying semantic networks that assure syntactic – semantic text interpretation (SSI), including an...
Anatol Popescu, Sergiu Cretu
JOC
2007
133views more  JOC 2007»
13 years 8 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
DIMVA
2011
13 years 9 days ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...