Sciweavers

3735 search results - page 643 / 747
» Order compression schemes
Sort
View
95
Voted
CSREASAM
2006
15 years 2 months ago
Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori
After the 9/11 event, terrorist attacks related to vehicles cannot be overlooked. In some critical areas, security should be concerned from the context of streets or vehicle moveme...
Li-Yen Hsu, Shin-Shin Kao
CSREASAM
2006
15 years 2 months ago
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints
- This paper proposes a "mechanism-based PKI", in which only a mechanism for generating user's private keys is installed on a smart card. The private key is generate...
Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, ...
106
Voted
FMOODS
2003
15 years 2 months ago
Managing the Evolution of .NET Programs
Abstract. The component-based model of code execution imposes some requirements on the software components themselves, and at the same time lays some constraints on the modern run-...
Susan Eisenbach, Vladimir Jurisic, Chris Sadler
96
Voted
PDPTA
2004
15 years 2 months ago
Achieving Flow Level QoS in Cut-Through Networks Through Admission Control and DiffServ
Cluster networks will serve as the future access networks for multimedia streaming, massive multiplayer online gaming, e-commerce, network storage etc. And for those application ar...
Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Sk...
118
Voted
SDM
2004
SIAM
144views Data Mining» more  SDM 2004»
15 years 2 months ago
RBA: An Integrated Framework for Regression based on Association Rules
This paper explores a novel framework for building regression models using association rules. The model consists of an ordered set of IF-THEN rules, where the rule consequent is t...
Aysel Ozgur, Pang-Ning Tan, Vipin Kumar