Sciweavers

1024 search results - page 160 / 205
» Value complete, column complete, predicate complete
Sort
View
XSYM
2010
Springer
148views Database» more  XSYM 2010»
14 years 10 months ago
Promoting the Semantic Capability of XML Keys
Keys for XML data trees can uniquely identify nodes based on the data values on some of their subnodes, either in the entire tree or relatively to some selected subtrees. Such keys...
Flavio Ferrarotti, Sven Hartmann, Sebastian Link, ...
ICPR
2010
IEEE
14 years 9 months ago
Variational Mixture of Experts for Classification with Applications to Landmine Detection
Abstract--In this paper, we (1) provide a complete framework for classification using Variational Mixture of Experts (VME); (2) derive the variational lower bound; and (3) apply th...
Seniha Esen Yuksel, Paul D. Gader
EUSFLAT
2009
134views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Flow Line Systems with Possibilistic Data: a System with Waiting Time in Line Uncertain
This paper proposes to analyze two flow line systems in which we include possibilistic data -the priority-discipline is possibilistic instead of probabilistic- and measure the perf...
David de la Fuente, María José Pardo
ICSE
2009
IEEE-ACM
14 years 9 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
IFIP
2009
Springer
14 years 9 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan