Sciweavers

34 search results - page 5 / 7
» ws 2006
Sort
View
JUCS
2006
135views more  JUCS 2006»
13 years 6 months ago
Visualization Services in a Conference Context: An Approach by RFID Technology
: Ambient Intelligent (AmI) vision is a new concept materialized by the Six Framework Program of the European Community. It involves three key technologies: Ubiquitous Computing, U...
José Bravo, Ramón Hervás, Ino...
JACM
2002
122views more  JACM 2002»
13 years 5 months ago
Cosmological lower bound on the circuit complexity of a small problem in logic
An exponential lower bound on the circuit complexity of deciding the weak monadic second-order theory of one successor (WS1S) is proved. Circuits are built from binary operations, ...
Larry J. Stockmeyer, Albert R. Meyer
PRL
2007
168views more  PRL 2007»
13 years 5 months ago
Competitive baseline methods set new standards for the NIPS 2003 feature selection benchmark
We used the datasets of the NIPS 2003 challenge on feature selection as part of the practical work of an undergraduate course on feature extraction. The students were provided wit...
Isabelle Guyon, Jiwen Li, Theodor Mader, Patrick A...
ICDIM
2006
IEEE
14 years 6 days ago
Exposing Web Services to Business Partners: Security and Quality of Service Issue
— Delivering QoS and ensuring security of Web Services (WS) based architecture is critical and constitutes a significant challenge because of its dynamic and unpredictable nature...
Yann Le Blevec, Chirine Ghedira, Djamal Benslimane...
WS
2006
ACM
14 years 3 days ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla