Sciweavers

32 search results - page 6 / 7
» On changing cofinality of partially ordered sets
Sort
View
TCS
2008
13 years 4 months ago
New constructions for provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masu...
CIKM
2005
Springer
13 years 10 months ago
Adaptive load shedding for windowed stream joins
We present an adaptive load shedding approach for windowed stream joins. In contrast to the conventional approach of dropping tuples from the input streams, we explore the concept...
Bugra Gedik, Kun-Lung Wu, Philip S. Yu, Ling Liu
FGR
2004
IEEE
205views Biometrics» more  FGR 2004»
13 years 8 months ago
Oriented Filters for Object Recognition: an Empirical Study
Local descriptors are increasingly used for the task of object recognition because of their perceived robustness with respect to occlusions and to global geometrical deformations....
Jerry Jun Yokono, Tomaso Poggio
SFP
2004
13 years 6 months ago
A graphic functional-dataflow language
NiMo (Nets in Motion) is a visual environment aimed to support totally graphic programming in Data Flow style, with a strong functional inspiration. Solutions of growing complexit...
Silvia Clerici, Cristina Zoltan
CPM
1993
Springer
154views Combinatorics» more  CPM 1993»
13 years 8 months ago
On Suboptimal Alignments of Biological Sequences
It is widely accepted that the optimal alignment between a pair of proteins or nucleic acid sequences that minimizes the edit distance may not necessarily re ect the correct biolog...
Dalit Naor, Douglas L. Brutlag