Sciweavers

1512 search results - page 68 / 303
» connection 2006
Sort
View
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 3 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
JCSS
2000
92views more  JCSS 2000»
14 years 9 months ago
Querying Spatial Databases via Topological Invariants
The paper investigates the use of topological annotations (called topological invariants) to answer topological queries in spatial databases. The focus is on the translation of to...
Luc Segoufin, Victor Vianu
ORDER
2010
100views more  ORDER 2010»
14 years 8 months ago
Quantum Logic in Dagger Kernel Categories
This paper investigates quantum logic from the perspective of categorical logic, and starts from minimal assumptions, namely the existence of involutions/daggers and kernels. The ...
Chris Heunen, Bart Jacobs
PODS
2006
ACM
98views Database» more  PODS 2006»
15 years 9 months ago
Processing queries on tree-structured data efficiently
This is a survey of algorithms, complexity results, and general solution techniques for efficiently processing queries on tree-structured data. I focus on query languages that com...
Christoph Koch
73
Voted
IJCNN
2006
IEEE
15 years 3 months ago
Learning using Dynamical Regime Identification and Synchronization
—This study proposes to generalize Hebbian learning by identifying and synchronizing the dynamical regimes of individual nodes in a recurrent network. The connection weights are ...
Nicolas Brodu