Sciweavers

11949 search results - page 222 / 2390
» Some results on (a:b)-choosability
Sort
View
DAWAK
2007
Springer
15 years 5 months ago
Mining First-Order Temporal Interval Patterns with Regular Expression Constraints
Most methods for temporal pattern mining assume that time is represented by points in a straight line starting at some initial instant. In this paper, we consider a new kind of fir...
Sandra de Amo, Arnaud Giacometti, Waldecir Pereira...
ELPUB
2007
ACM
15 years 5 months ago
Digitisation and Access to Archival Collections: A Case Study of the Sofia Municipal Government (1878-1879)
The paper presents in brief a project aimed at the development of a methodology and corresponding software tools intended for building of proper environments giving up means for s...
Maria Nisheva-Pavlova, Pavel Pavlov, Nikolay Marko...
ELPUB
2007
ACM
15 years 5 months ago
The Fight against Spam - A Machine Learning Approach
The paper presents a brief survey of the fight between spammers and antispam software developers, and also describes new approaches to spam filtering. In the first two sections we...
Karel Jezek, Jiri Hynek
ASAP
2004
IEEE
123views Hardware» more  ASAP 2004»
15 years 5 months ago
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems
IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these al...
Fabien Castanier, Alberto Ferrante, Vincenzo Piuri
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
15 years 5 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh