Sciweavers

116 search results - page 15 / 24
» Suballowable sequences of permutations
Sort
View
SIGMOD
2004
ACM
188views Database» more  SIGMOD 2004»
16 years 4 months ago
Online Event-driven Subsequence Matching over Financial Data Streams
Subsequence similarity matching in time series databases is an important research area for many applications. This paper presents a new approximate approach for automatic online s...
Huanmei Wu, Betty Salzberg, Donghui Zhang
CSFW
2009
IEEE
15 years 10 months ago
Minimal Message Complexity of Asynchronous Multi-party Contract Signing
Multi-party contract signing protocols specify how a number of signers can cooperate in achieving a fully signed contract, even in the presence of dishonest signers. This problem h...
Sjouke Mauw, Sasa Radomirovic, Mohammad Torabi Das...
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
15 years 10 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
CEC
2007
IEEE
15 years 10 months ago
N-gram fitness function with a constraint in a musical evolutionary system
—This paper describes an evolutionary music composition system that combines trainable music critics with a bag of notes constraint. Unlike many evolutionary composition systems,...
Man Yat Lo, Simon M. Lucas
KBSE
2007
IEEE
15 years 10 months ago
Testing concurrent programs using value schedules
Concurrent programs are difficult to debug and verify because of the nondeterministic nature of concurrent executions. A particular concurrency-related bug may only show up under ...
Jun Chen, Steve MacDonald