Sciweavers

3793 search results - page 646 / 759
» Expressive Description Logics
Sort
View
94
Voted
IDA
2006
Springer
14 years 10 months ago
Supporting bi-cluster interpretation in 0/1 data by means of local patterns
Clustering or co-clustering techniques have been proved useful in many application domains. A weakness of these techniques remains the poor support for grouping characterization. ...
Ruggero G. Pensa, Céline Robardet, Jean-Fra...
IJNSEC
2006
94views more  IJNSEC 2006»
14 years 10 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
91
Voted
JCSS
2008
159views more  JCSS 2008»
14 years 10 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
ENTCS
2007
101views more  ENTCS 2007»
14 years 10 months ago
Model-checking Distributed Components: The Vercors Platform
This article presents a component verification platform called Vercors providing means to analyse the behaviour properties of applications built from distributed components. From...
Tomás Barros, Antonio Cansado, Eric Madelai...
87
Voted
PR
2006
119views more  PR 2006»
14 years 10 months ago
Performance evaluation and optimization for content-based image retrieval
Performance evaluation of content-based image retrieval (CBIR) systems is an important but still unsolved problem. The reason for its importance is that only performance evaluatio...
Julia Vogel, Bernt Schiele