Sciweavers

829 search results - page 101 / 166
» A new watermarking approach for relational data
Sort
View
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
COLING
2002
14 years 9 months ago
Effective Structural Inference for Large XML Documents
This paper investigates methods to automatically infer structural information from large XML documents. Using XML as a reference format, we approach the schema generation problem ...
Jason Sankey, Raymond K. Wong
IJNS
2010
106views more  IJNS 2010»
14 years 8 months ago
Cascade Process Modeling with Mechanism-Based Hierarchical Neural Networks
Abstract: Cascade process, such as wastewater treatment plant, includes many nonlinear subsystems and many variables. When the number of sub-systems is big, the input-output relati...
Qiumei Cong, Wen Yu, Tianyou Chai
NAACL
2010
14 years 8 months ago
Topic Models for Image Annotation and Text Illustration
Image annotation, the task of automatically generating description words for a picture, is a key component in various image search and retrieval applications. Creating image datab...
Yansong Feng, Mirella Lapata
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
Validation and Improvement of the Lossy Difference Aggregator to Measure Packet Delays
One-way packet delay is an important network performance metric. Recently, a new data structure called Lossy Difference Aggregator (LDA) has been proposed to estimate this metric m...
Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Jose...