Sciweavers

210 search results - page 24 / 42
» Considering Ill-Definedness of Problems from the Aspect of S...
Sort
View
ALGOSENSORS
2008
Springer
15 years 1 months ago
Deployment of Asynchronous Robotic Sensors in Unknown Orthogonal Environments
We consider the problem of uniformly dispersing mobile robotic sensors in a simply connected orthogonal space of unknown shape. The mobile sensors are injected into the space from ...
Eduardo Mesa Barrameda, Shantanu Das, Nicola Santo...
IJCAI
2003
15 years 1 months ago
Continuous nonlinear dimensionality reduction by kernel Eigenmaps
We equate nonlinear dimensionality reduction (NLDR) to graph embedding with side information about the vertices, and derive a solution to either problem in the form of a kernel-ba...
Matthew Brand
CCS
2006
ACM
15 years 3 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
SIGMOD
2003
ACM
140views Database» more  SIGMOD 2003»
15 years 12 months ago
Stream Processing of XPath Queries with Predicates
We consider the problem of evaluating large numbers of XPath filters, each with many predicates, on a stream of XML documents. The solution we propose is to lazily construct a sin...
Ashish Kumar Gupta, Dan Suciu
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
15 years 5 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarinā€...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...