Sciweavers

3360 search results - page 270 / 672
» Opportunistic Data Structures with Applications
Sort
View
ACSC
2007
IEEE
15 years 8 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
ICDE
2002
IEEE
102views Database» more  ICDE 2002»
16 years 6 months ago
Cost Models for Overlapping and Multi-Version B-Trees
Overlapping and multi-version techniques are two popular frameworks that transform an ephemeral index into a multiple logical-tree structure in order to support versioning databas...
Yufei Tao, Dimitris Papadias, Jun Zhang
IJCAI
1997
15 years 6 months ago
On the Role of Hierarchy for Neural Network Interpretation
In this paper, we concentrate on the expressive power of hierarchical structures in neural networks. Recently, the so-called SplitNet model was introduced. It develops a dynamic n...
Jürgen Rahmel, Christian Blum, Peter Hahn
ICDE
2003
IEEE
149views Database» more  ICDE 2003»
16 years 6 months ago
Indexing Weighted-Sequences in Large Databases
We present an index structure for managing weightedsequences in large databases. A weighted-sequence is defined as a two-dimensional structure where each element in the sequence i...
Haixun Wang, Chang-Shing Perng, Wei Fan, Sanghyun ...
PKDD
1999
Springer
130views Data Mining» more  PKDD 1999»
15 years 9 months ago
OPTICS-OF: Identifying Local Outliers
: For many KDD applications finding the outliers, i.e. the rare events, is more interesting and useful than finding the common cases, e.g. detecting criminal activities in E-commer...
Markus M. Breunig, Hans-Peter Kriegel, Raymond T. ...