Sciweavers

4790 search results - page 155 / 958
» Reverse Query Processing
Sort
View
CORR
2010
Springer
64views Education» more  CORR 2010»
15 years 2 months ago
Near-Optimal Evasion of Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can efficiently query a classifier to elicit information that allows the adversary to evade de...
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Hua...
ICDE
2009
IEEE
165views Database» more  ICDE 2009»
16 years 4 months ago
Spatial Range Querying for Gaussian-Based Imprecise Query Objects
Abstract-- In sensor environments and moving robot applications, the position of an object is often known imprecisely because of measurement error and/or movement of the object. In...
Yoshiharu Ishikawa, Yuichi Iijima, Jeffrey Xu Yu
127
Voted
SSD
2001
Springer
111views Database» more  SSD 2001»
15 years 6 months ago
Querying Mobile Objects in Spatio-Temporal Databases
In dynamic spatio-temporal environments where objects may continuously move in space, maintaining consistent information about the location of objects and processing motion-speciï¬...
Kriengkrai Porkaew, Iosif Lazaridis, Sharad Mehrot...
WCRE
2003
IEEE
15 years 7 months ago
Completeness of a Fact Extractor
The process of software reverse engineering commonly uses an extractor, which parses source code and extracts facts about the code. The level of detail in these facts varies from ...
Yuan Lin, Richard C. Holt, Andrew J. Malton
ICALP
2000
Springer
15 years 6 months ago
Amalgamation of Transition Sequences in the PEPA Formalism
This report presents a formal approach to reducing sequences in PEPA components. Performing the described amalgamation procedure we may remove, from the underlying Markov chain, t...
Jane Hillston, J. Tomasik