Sciweavers

1986 search results - page 332 / 398
» constraints 2006
Sort
View
DAS
2006
Springer
14 years 1 months ago
Offline Handwritten Arabic Character Segmentation with Probabilistic Model
The research on offline handwritten Arabic character recognition has received more and more attention in recent years, because of the increasing needs of Arabic document digitizati...
Pingping Xiu, Liangrui Peng, Xiaoqing Ding, Hua Wa...
DAWAK
2006
Springer
14 years 1 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
DBISP2P
2006
Springer
110views Database» more  DBISP2P 2006»
14 years 1 months ago
Reusing Classical Query Rewriting in P2P Databases
Sharing of structured data in P2P overlays is a challenging problem, especially in the absence of a global schema. The nature of structured data stored in the overlay enforces stri...
Verena Kantere, Timos K. Sellis
DEXA
2006
Springer
152views Database» more  DEXA 2006»
14 years 1 months ago
Concurrency Management in Transactional Web Services Coordination
The Business Process Execution Language BPEL4WS has emerged to introduce process dimension in Web Services coordination. At the same time, a lot of needs related to business proces...
Adnene Guabtni, François Charoy, Claude God...
DICS
2006
14 years 1 months ago
Algorithms for Failure Protection in Large IP-over-fiber and Wireless Ad Hoc Networks
We address failure location and restoration in both optical and wireless ad hoc networks. First, we show how Maximum Likelihood inference can improve failure location algorithms in...
Frederick Ducatelle, Luca Maria Gambardella, Macie...