Sciweavers

5401 search results - page 1025 / 1081
» Using Versions in GIS
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 2 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
CAISE
2004
Springer
14 years 2 months ago
MT-Flow - An Environment for Workflow-Supported Model Transformations in MDA
Abstract. Specification of systems in a software product line (product-line members) is often supported by domain-specific languages (DSLs) that provide pownguage abstractions for ...
Jernej Kovse, Theo Härder
EUROCRYPT
2004
Springer
14 years 2 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
FUZZY
2004
Springer
170views Fuzzy Logic» more  FUZZY 2004»
14 years 2 months ago
Consistency Conditions for Fuzzy Choice Functions
The revealed preference is a central subject in classical consumer theory. Authors like Samuelson, Arrow, Richter, Sen, Uzawa and others have proposed an axiomatic setting of reve...
Irina Georgescu
IFIP
2004
Springer
14 years 2 months ago
Behavioural Equivalences for Dynamic Web Data
Peer-to-peer systems, exchanging dynamic documents through Web services, are a simple and effective platform for data integration on the internet. Dynamic documents can contain b...
Sergio Maffeis, Philippa Gardner
« Prev « First page 1025 / 1081 Last » Next »