Sciweavers

4987 search results - page 918 / 998
» Fuzzifying P Systems
Sort
View
107
Voted
INFOCOM
2007
IEEE
15 years 9 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin
132
Voted
NDSS
2007
IEEE
15 years 9 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
ICCBR
2007
Springer
15 years 9 months ago
Knowledge Extraction and Summarization for an Application of Textual Case-Based Interpretation
Abstract. This paper presents KES (Knowledge Extraction and Summarization), a new knowledge-enhanced approach that builds a case memory out of episodic textual narratives. These na...
Eni Mustafaraj, Martin Hoof, Bernd Freisleben
138
Voted
DFT
2006
IEEE
130views VLSI» more  DFT 2006»
15 years 9 months ago
Off-Chip Control Flow Checking of On-Chip Processor-Cache Instruction Stream
Control flow checking (CFC) is a well known concurrent checking technique for ensuring that a program’s instruction execution sequence follows permissible paths. Almost all CFC...
Federico Rota, Shantanu Dutt, Sahithi Krishna
131
Voted
EDOC
2006
IEEE
15 years 9 months ago
Service Interaction Modeling: Bridging Global and Local Views
In a Service-Oriented Architecture (SOA), a system is viewed as a collection of independent units (services) that interact with one another through message exchanges. Established ...
Johannes Maria Zaha, Marlon Dumas, Arthur H. M. te...