Sciweavers

2036 search results - page 284 / 408
» A generic type-and-effect system
Sort
View
133
Voted
IACR
2011
292views more  IACR 2011»
14 years 12 days ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
115
Voted
ECCV
2002
Springer
16 years 2 months ago
Transitions of the 3D Medial Axis under a One-Parameter Family of Deformations
The instabilities of the medial axis of a shape under deformations have long been recognized as a major obstacle to its use in recognition and other applications. These instabilit...
Peter J. Giblin, Benjamin B. Kimia
183
Voted
ICDT
2009
ACM
130views Database» more  ICDT 2009»
16 years 1 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
SIGMOD
2006
ACM
138views Database» more  SIGMOD 2006»
16 years 27 days ago
Context-sensitive ranking
The original PageRank algorithm for improving the ranking of search-query results computes a single vector, using the link structure of the Web, to capture the relative "impor...
Rakesh Agrawal, Ralf Rantzau, Evimaria Terzi
86
Voted
EDBT
2008
ACM
118views Database» more  EDBT 2008»
16 years 27 days ago
Robustness in automatic physical database design
Automatic physical database design tools rely on "what-if" interfaces to the query optimizer to estimate the execution time of the training query workload under differen...
Kareem El Gebaly, Ashraf Aboulnaga