Sciweavers

605 search results - page 37 / 121
» Parameterized Dynamic Tables
Sort
View
FLAIRS
2008
15 years 29 days ago
Answer Set Programming on Expert Feedback to Populate and Extend Dynamic Ontologies
The next generation of online reference works will require structured representations of their contents in order to support scholarly functions such as semantic search, automated ...
Mathias Niepert, Cameron Buckner, Colin Allen
IJNSEC
2008
155views more  IJNSEC 2008»
14 years 10 months ago
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maint...
Mohammed Misbahuddin, C. Shoba Bindu
94
Voted
STOC
2003
ACM
164views Algorithms» more  STOC 2003»
15 years 11 months ago
Approximate counting by dynamic programming
We give efficient algorithms to sample uniformly, and count approximately, the solutions to a zero-one knapsack problem. The algorithm is based on using dynamic programming to pro...
Martin E. Dyer
VLDB
1998
ACM
204views Database» more  VLDB 1998»
15 years 2 months ago
Clustering Categorical Data: An Approach Based on Dynamical Systems
Wedescribea novel approachfor clustering collectionsof sets,andits applicationto theanalysis and mining of categoricaldata. By "categorical data," we meantableswith fiel...
David Gibson, Jon M. Kleinberg, Prabhakar Raghavan
CORR
2010
Springer
212views Education» more  CORR 2010»
14 years 10 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...