Sciweavers

1712 search results - page 119 / 343
» A Computational Approach to Binding Theory
Sort
View
SIGMOD
2011
ACM
221views Database» more  SIGMOD 2011»
14 years 4 months ago
Scalable query rewriting: a graph-based approach
In this paper we consider the problem of answering queries using views, which is important for data integration, query optimization, and data warehouses. We consider its simplest ...
George Konstantinidis, José Luis Ambite
CVPR
1997
IEEE
16 years 3 months ago
Local Blur Estimation and Super-Resolution
Until now, all super-resolution algorithms have presumed that the images were taken under the same illumination conditions. This paper introduces a new approach to super-resolutio...
Ming-Chao Chiang, Terrance E. Boult
CCS
2008
ACM
15 years 3 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
CALCO
2007
Springer
95views Mathematics» more  CALCO 2007»
15 years 7 months ago
Higher Dimensional Trees, Algebraically
In formal language theory, James Rogers published a series of innovative papers generalising strings and trees to higher dimensions.Motivated by applications in linguistics, his go...
Neil Ghani, Alexander Kurz
IPPS
2008
IEEE
15 years 8 months ago
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm
—In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring vari...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...