Sciweavers

1154 search results - page 68 / 231
» The Degradation of Knowledge Base Integrity
Sort
View
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
14 years 22 days ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
ISMIS
1999
Springer
14 years 1 months ago
A Statistical Approach to Rule Selection in Semantic Query Optimisation
Semantic Query Optimisation makes use of the semantic knowledge of a database (rules) to perform query transformation. Rules are normally learned from former queries fired by the u...
Barry G. T. Lowden, Jerome Robinson
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
14 years 1 months ago
Aggregation of Imprecise and Uncertain Information for Knowledge Discovery in Databases
We consider the problem of aggregation for uncertain and imprecise data. For such data, we define aggregation operators and use them to provide information on properties and patte...
Sally I. McClean, Bryan W. Scotney, Mary Shapcott
EUROPAR
2005
Springer
14 years 2 months ago
On AAA Based on Brokers and Pre-encrypted Keys in MIPv6
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the suppo...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
ICMCS
2005
IEEE
145views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Error Resilient Multiple Description Coding Based on Wavelet Tree Coding and EREC for Wireless Networks
In this paper, we propose an integrated error resilient MDC scheme for wireless networks with both packet loss and random bit errors. Two descriptions are first generated independ...
Daewon Song, Lei Cao, Chang Wen Chen