Sciweavers

300 search results - page 49 / 60
» The Extension Theorem
Sort
View
CSL
2007
Springer
14 years 1 months ago
Qualitative Temporal and Spatial Reasoning Revisited
Abstract. Establishing local consistency is one of the main algorithmic techniques in temporal and spatial reasoning. In this area, one of the central questions for the various pro...
Manuel Bodirsky, Hubie Chen
CSFW
2006
IEEE
14 years 1 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
GLOBECOM
2006
IEEE
14 years 1 months ago
Predictive Buffering for Multi-Source Video Streaming over the Internet
—The current best-effort Internet does not guarantee the bandwidth availability between a receiver and a sender, and so renders any quality-of-service (QoS) control difficult, if...
P. Y. Ho, Jack Y. B. Lee
ICDM
2006
IEEE
134views Data Mining» more  ICDM 2006»
14 years 1 months ago
Fast Frequent Free Tree Mining in Graph Databases
Free tree, as a special graph which is connected, undirected and acyclic, is extensively used in domains such as computational biology, pattern recognition, computer networks, XML...
Peixiang Zhao, Jeffrey Xu Yu
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon