Sciweavers

TIT
2010
83views Education» more  TIT 2010»
13 years 6 months ago
Two-dimensional constrained coding based on tiling
A new variable-rate coding technique is presented for two-dimensional constraints. For certain constraints, such as the (0, 2)-RLL, (2, )-RLL, and the "no isolated bits" ...
Artyom Sharov, Ron M. Roth
INFOSCALE
2007
ACM
14 years 1 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
FC
2005
Springer
120views Cryptology» more  FC 2005»
14 years 5 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
HICSS
2006
IEEE
127views Biometrics» more  HICSS 2006»
14 years 5 months ago
Processing of Data Streams with Prediction Functions
Networks of sensors arise naturally in many different fields, from industrial applications (e.g., monitoring of environmental parameters in a chemical plant) to surveillance appl...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...