Sciweavers

4397 search results - page 650 / 880
» Relational Algebra Operations
Sort
View
IWDW
2009
Springer
15 years 10 months ago
Estimating the Information Theoretic Optimal Stego Noise
We recently developed a new benchmark for steganography, underpinned by the square root law of capacity, called Steganographic Fisher Information (SFI). It is related to the multip...
Andrew D. Ker
128
Voted
MKM
2009
Springer
15 years 10 months ago
Unifying Math Ontologies: A Tale of Two Standards
Abstract. One of the fundamental and seemingly simple aims of mathematical knowledge management (MKM) is to develop and standardize formats that allow to “represent the meaning o...
James H. Davenport, Michael Kohlhase
118
Voted
EICS
2009
ACM
15 years 10 months ago
A bisimulation-based approach to the analysis of human-computer interaction
This paper discusses the use of formal methods for analysing human-computer interaction. We focus on the mode confusion problem that arises whenever the user thinks that the syste...
Sébastien Combéfis, Charles Pecheur
125
Voted
SACMAT
2009
ACM
15 years 10 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
127
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Network virtualization: a view from the bottom
The interest in network virtualization has been growing steadily among the networking community in the last few years. Network virtualization opens up new possibilities for the ev...
Jorge Carapinha, Javier Jiménez