Sciweavers

1229 search results - page 167 / 246
» A New Method for Dependent Parsing
Sort
View
DASFAA
2009
IEEE
93views Database» more  DASFAA 2009»
15 years 4 months ago
Top-K Correlation Sub-graph Search in Graph Databases
Recently, due to its wide applications, (similar) subgraph search has attracted a lot of attentions from database and data mining community, such as [13, 18, 19, 5]. In [8], Ke et ...
Lei Zou, Lei Chen 0002, Yansheng Lu
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 4 months ago
Optimum TCM Codes Design for Gaussian Channels by Considering Both Euclidean and Hamming Distances
—Trellis-coded modulation (TCM) is an attractive coded modulation technique which yields significant coding gain without bandwidth expansion. So far, researches concerning the o...
Xiao-Xin Zhang, Yuping Zhao, Li Zou
ICST
2009
IEEE
15 years 4 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
IROS
2009
IEEE
196views Robotics» more  IROS 2009»
15 years 4 months ago
Scene recognition with omnidirectional vision for topological map using lightweight adaptive descriptors
Abstract— Mobile robots rely on their ability of scene recognition to build a topological map of the environment and perform location-related tasks. In this paper, we describe a ...
Ming Liu, Davide Scaramuzza, Cédric Pradali...
SPIN
2009
Springer
15 years 4 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...