Sciweavers

8266 search results - page 82 / 1654
» Information About the Journal
Sort
View
JNCA
2006
86views more  JNCA 2006»
14 years 12 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
MST
2008
94views more  MST 2008»
14 years 12 months ago
Partial Bi-immunity, Scaled Dimension, and NP-Completeness
The Turing and many-one completeness notions for NP have been previously separated under measure, genericity, and bi-immunity hypotheses on NP. The proofs of all these results rel...
John M. Hitchcock, Aduri Pavan, N. V. Vinodchandra...
IJRR
2000
58views more  IJRR 2000»
14 years 11 months ago
Geared Robot Manipulators with a Jointed Unit: Topological Synthesis and Its Application
jr.sagepub.com/cgi/content/abstract/19/2/183 The online version of this article can be found at: Published by: http://www.sagepublications.com On behalf of: Multimedia Archives can...
Dar-Zen Chen, Yu-Chu Huang, Dong-Wen Duh
SCIENTOMETRICS
2010
138views more  SCIENTOMETRICS 2010»
14 years 10 months ago
Characteristic scores and scales in a Lotkaian framework
The characteristic scores and scales (CSS), introduced by Glänzel and Schubert [Journal of Information Science 14, 123-127, 1988] and further studied in subsequent papers of Glä...
Leo Egghe
KDD
2006
ACM
179views Data Mining» more  KDD 2006»
16 years 9 days ago
Group formation in large social networks: membership, growth, and evolution
The processes by which communities come together, attract new members, and develop over time is a central research issue in the social sciences -- political movements, professiona...
Lars Backstrom, Daniel P. Huttenlocher, Jon M. Kle...