Sciweavers

77016 search results - page 15164 / 15404
» Modelling
Sort
View
DKE
2007
107views more  DKE 2007»
15 years 4 months ago
A clustering method based on path similarities of XML data
Current studies on the storage of XML data are focused on either the efficient mapping of XML data onto an existing RDBMS or the development of a native XML storage. Some native X...
Il-Hwan Choi, Bongki Moon, Hyoung-Joo Kim
JCST
2006
99views more  JCST 2006»
15 years 4 months ago
A Dialectal Chinese Speech Recognition Framework
Abstract A framework for dialectal Chinese speech recognition is proposed and studied, in which a relatively small dialectal Chinese (or in other words Chinese influenced by the na...
Jing Li, Thomas Zheng, William Byrne, Daniel Juraf...
JSYML
2008
66views more  JSYML 2008»
15 years 4 months ago
Special groups whose isometry relation is a finite union of cosets
0-stable 0-categorical linked quaternionic mappings are studied and are shown to correspond (in some sense) to special groups which are 0stable, 0-categorical, satisfy AP(3) and ha...
Vincent Astier
JUCS
2008
112views more  JUCS 2008»
15 years 4 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
JUCS
2008
166views more  JUCS 2008»
15 years 4 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
« Prev « First page 15164 / 15404 Last » Next »