Sciweavers

3116 search results - page 251 / 624
» Recovering
Sort
View
103
Voted
AMAI
2007
Springer
15 years 28 days ago
Distance semantics for database repair
Abstract In many scenarios, a database instance violates a given set of integrity constraints. In such cases, it is often required to repair the database, that is, to restore its c...
Ofer Arieli, Marc Denecker, Maurice Bruynooghe
83
Voted
AMC
2010
116views more  AMC 2010»
15 years 28 days ago
On a bilinear optimization problem in parallel magnetic resonance imaging
This work is concerned with the structure of bilinear minimization problems arising in recovering subsampled and modulated images in parallel magnetic resonance imaging. By consid...
Christian Clason, Gregory von Winckel
82
Voted
AMC
2007
75views more  AMC 2007»
15 years 28 days ago
Fingerprint images encryption via multi-scroll chaotic attractors
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scrol...
Fengling Han, Jiankun Hu, Xinghuo Yu, Yi Wang
COGSCI
2010
55views more  COGSCI 2010»
15 years 27 days ago
Three Attempts to Replicate the Behavioral Sunk-Cost Effect: A Note on
Cunha and Caldieraro (2009) investigated whether sunk-cost effects, which are well documented in hypothetical situations involving monetary investments, also occur in choice situa...
A. Ross Otto
103
Voted
CHINAF
2008
105views more  CHINAF 2008»
15 years 27 days ago
Fast correlation attack on stream cipher ABC v3
ABC v3 is a stream cipher proposed as a candidate to ECRYPT Estream Project which enters the second evaluation phase. Its key length is 128 bits. In this paper, We show that, ther...
Haina Zhang, Lin Li, Xiaoyun Wang