Sciweavers

535 search results - page 16 / 107
» Insertion and Expansion Operations for
Sort
View
80
Voted
IEEEIAS
2008
IEEE
15 years 3 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
96
Voted
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
A black-box secret sharing scheme (BBSSS) for a given access structure works in exactly the same way over any finite Abelian group, as it only requires black-box access to group o...
Ronald Cramer, Serge Fehr, Martijn Stam
VLDB
2004
ACM
144views Database» more  VLDB 2004»
15 years 2 months ago
Returning Modified Rows - SELECT Statements with Side Effects
SQL in the IBM® DB2® Universal Database™ for Linux®, UNIX®, and Windows® (DB2 UDB) database management product has been extended to support nested INSERT, UPDATE, and DELET...
Andreas Behm, Serge Rielau, Richard Swagerman
NIPS
2008
14 years 11 months ago
Model selection and velocity estimation using novel priors for motion patterns
Psychophysical experiments show that humans are better at perceiving rotation and expansion than translation. These findings are inconsistent with standard models of motion integr...
Shuang Wu, Hongjing Lu, Alan L. Yuille
CORR
2006
Springer
94views Education» more  CORR 2006»
14 years 9 months ago
Zig-zag and Replacement Product Graphs and LDPC Codes
It is known that the expansion property of a graph influences the performance of the corresponding code when decoded using iterative algorithms. Certain graph products may be used ...
Christine A. Kelley, Deepak Sridhara, Joachim Rose...