Sciweavers

140 search results - page 25 / 28
» A Content-Oriented Data Model for Semistructured Data
Sort
View
92
Voted
AISM
2004
14 years 10 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
77
Voted
LPAR
2007
Springer
15 years 3 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
IROS
2008
IEEE
135views Robotics» more  IROS 2008»
15 years 3 months ago
Probabilistic UHF RFID tag pose estimation with multiple antennas and a multipath RF propagation model
—We present a novel particle filter implementation for estimating the pose of tags in the environment with respect to an RFID-equipped robot. This particle filter combines sign...
Travis Deyle, Charles C. Kemp, Matthew S. Reynolds
FROCOS
2007
Springer
15 years 3 months ago
Languages Modulo Normalization
Abstract. We propose a new class of tree automata, called tree automata with normalization (TAN). This framework extends equational tree automata, and improved the results of them:...
Hitoshi Ohsaki, Hiroyuki Seki
ICDT
2007
ACM
126views Database» more  ICDT 2007»
15 years 3 months ago
Combining Incompleteness and Ranking in Tree Queries
Abstract. In many cases, users may want to consider incomplete answers to their queries. Often, however, there is an overwhelming number of such answers, even if subsumed answers a...
Benny Kimelfeld, Yehoshua Sagiv