Sciweavers

1747 search results - page 36 / 350
» Long Range Dependence
Sort
View
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
15 years 1 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
ACL
2003
15 years 1 months ago
Unsupervised Learning of Dependency Structure for Language Modeling
This paper presents a dependency language model (DLM) that captures linguistic constraints via a dependency structure, i.e., a set of probabilistic dependencies that express the r...
Jianfeng Gao, Hisami Suzuki
ICDE
2003
IEEE
120views Database» more  ICDE 2003»
16 years 1 months ago
Broadcasting Dependent Data for Ordered Queries without Replication in a Multi-Channel Mobile Environment
In several mobile applications, the data items broadcast are dependent upon one another. However, most prior studies on broadcasting dependent data mainly consider single broadcas...
Jiun-Long Huang, Ming-Syan Chen, Wen-Chih Peng
PRDC
2005
IEEE
15 years 5 months ago
Development of Dependable Real-Time Systems with Zerberus
Although the main fault-tolerance techniques are known for a long time, there exists no consistent approach for implementing dependable applications in the sense that the fault-to...
Christian Buckl, Alois Knoll, Gerhard Schrott
ACSC
2006
IEEE
15 years 5 months ago
Identifying refactoring opportunities by identifying dependency cycles
The purpose of refactoring is to improve the quality of a software system by changing its internal design so that it is easier to understand or modify, or less prone to errors and...
Hayden Melton, Ewan D. Tempero