Sciweavers

1206 search results - page 165 / 242
» Convergence analysis of online algorithms
Sort
View
ICSE
2005
IEEE-ACM
15 years 10 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
LCN
2005
IEEE
15 years 3 months ago
Implementation and Performance Analysis of a Packet Scheduler on a Programmable Network Processor
— The problem of achieving fairness in the allocation of the bandwidth resource on a link shared by multiple flows of traffic has been extensively researched over the last deca...
Fariza Sabrina, Salil S. Kanhere, Sanjay Jha
WWW
2007
ACM
15 years 10 months ago
A new suffix tree similarity measure for document clustering
In this paper, we propose a new similarity measure to compute the pairwise similarity of text-based documents based on suffix tree document model. By applying the new suffix tree ...
Hung Chim, Xiaotie Deng
ICDAR
2009
IEEE
15 years 4 months ago
Arabic Handwriting Recognition Using Restored Stroke Chronology
In this paper we present a system of the off-line handwriting recognition. Our recognition system is based on temporal order restoration of the off-line trajectory. For this task ...
Abdelkarim Elbaati, Houcine Boubaker, Monji Kheral...
DAWAK
2005
Springer
15 years 3 months ago
FMC: An Approach for Privacy Preserving OLAP
To preserve private information while providing thorough analysis is one of the significant issues in OLAP systems. One of the challenges in it is to prevent inferring the sensitiv...
Ming Hua, Shouzhi Zhang, Wei Wang 0009, Haofeng Zh...