Sciweavers

6907 search results - page 228 / 1382
» Securing distributed adaptation
Sort
View
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
15 years 8 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
GMP
2006
IEEE
157views Solid Modeling» more  GMP 2006»
15 years 10 months ago
Density-Controlled Sampling of Parametric Surfaces Using Adaptive Space-Filling Curves
Abstract. Low-discrepancy point distributions exhibit excellent uniformity properties for sampling in applications such as rendering and measurement. We present an algorithm for ge...
J. A. Quinn, Frank C. Langbein, Ralph R. Martin, G...
PCM
2001
Springer
183views Multimedia» more  PCM 2001»
15 years 8 months ago
An Adaptive Index Structure for High-Dimensional Similarity Search
A practical method for creating a high dimensional index structure that adapts to the data distribution and scales well with the database size, is presented. Typical media descrip...
Peng Wu, B. S. Manjunath, Shivkumar Chandrasekaran
CCS
2007
ACM
15 years 10 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
ISSTA
2004
ACM
15 years 9 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha