Sciweavers

8825 search results - page 203 / 1765
» All for one or one for all
Sort
View
97
Voted
PAKDD
2004
ACM
117views Data Mining» more  PAKDD 2004»
15 years 7 months ago
Constraint-Based Mining of Formal Concepts in Transactional Data
We are designing new data mining techniques on boolean contexts to identify a priori interesting concepts, i.e., closed sets of objects (or transactions) and associated closed sets...
Jérémy Besson, Céline Robarde...
SDMW
2004
Springer
15 years 7 months ago
A Structure Preserving Database Encryption Scheme
Abstract. A new simple and efficient database encryption scheme is presented. The new scheme enables encrypting the entire content of the database without changing its structure. I...
Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehu...
ARITH
2003
IEEE
15 years 6 months ago
Scaling an RNS Number Using the Core Function
This paper introduces a method for extracting the core of a Residue Number System (RNS) number within the RNS, this affording a new method for scaling RNS numbers. Suppose an RNS ...
Neil Burgess
CSFW
2003
IEEE
15 years 6 months ago
On Generalized Authorization Problems
This paper defines a framework in which one can formalize a variety of authorization and policy issues that arise in access control of shared computing resources. Instantiations ...
Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart...
DATE
2003
IEEE
108views Hardware» more  DATE 2003»
15 years 6 months ago
EBIST: A Novel Test Generator with Built-In Fault Detection Capability
Abstract : A novel design methodology for test pattern generation in BIST is presented. Here faults and errors in the generator itself are detected. Two different design methodolog...
Dhiraj K. Pradhan, Chunsheng Liu, Krishnendu Chakr...