Sciweavers

Share
6 search results - page 1 / 2
» Forbidden magnification? II
Sort
View
ESANN
2004
10 years 1 months ago
Forbidden magnification? II
The twin of this paper, "Forbidden Magnification? I." [1], presents systematic SOM simulations with the explicit magnification control scheme of Bauer, Der, and Herrmann ...
Erzsébet Merényi, Abha Jain
ESANN
2004
10 years 1 months ago
Forbidden Magnification? I
This paper presents some interesting results obtained by the algorithm by Bauer, Der and Hermann (BDH) [1] for magnification control in Self-Organizing Maps. Magnification control ...
Abha Jain, Erzsébet Merényi
EDBT
2008
ACM
137views Database» more  EDBT 2008»
10 years 12 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
ADHOC
2015
4 years 7 months ago
DICSA: Distributed and concurrent link scheduling algorithm for data gathering in wireless sensor networks
Although link scheduling has been used to improve the performance of data gathering applications, unfortunately, existing link scheduling algorithms are either centralized or they...
Behnam Dezfouli, Marjan Radi, Kamin Whitehouse, Sh...
CALCO
2009
Springer
169views Mathematics» more  CALCO 2009»
10 years 6 months ago
Correctness, Completeness and Termination of Pattern-Based Model-to-Model Transformation
Abstract. Model-to-model (M2M) transformation consists in transforming models from a source to a target language. Many transformation languages exist, but few of them combine a dec...
Fernando Orejas, Esther Guerra, Juan de Lara, Hart...
books