Sciweavers

396 search results - page 51 / 80
» The missing Wendland functions
Sort
View
ICDT
2009
ACM
109views Database» more  ICDT 2009»
14 years 9 months ago
TOP-K projection queries for probabilistic business processes
A Business Process (BP) consists of some business activities undertaken by one or more organizations in pursuit of some business goal. Tools for querying and analyzing BP specific...
Daniel Deutch, Tova Milo
WWW
2003
ACM
14 years 9 months ago
Using Compact GML to Deploy Interactive Maps on Mobile
As users get connected with new-generation smart programmable phones and Personal Digital Assistants, they look for geographic information and location-aware services. In such a s...
Emanuela De Vita, Andrea Piras, Stefano Sanna
CSE
2009
IEEE
14 years 3 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi
ICCBR
2009
Springer
14 years 3 months ago
Case-Based Support for Forestry Decisions: How to See the Wood from the Trees
In forestry, it is important to be able to accurately determine the volume of timber in a harvesting site and the products that could potentially be produced from that timber. We d...
Conor Nugent, Derek G. Bridge, Glen Murphy, Bernt-...
IH
2009
Springer
14 years 3 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...