Sciweavers

48 search results - page 3 / 10
» his 2001
Sort
View
HIS
2003
13 years 7 months ago
Data Mining of Web Access Logs From an Academic Web Site
We have used a general purpose data mining tool to determine whether we can find any ‘golden nuggets’ in the web access logs of a large academic web site. Our goal was to use...
Victor Ciesielski, A. Lalani
IMA
2001
Springer
117views Cryptology» more  IMA 2001»
13 years 10 months ago
An Identity Based Encryption Scheme Based on Quadratic Residues
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the ...
Clifford Cocks
FLAIRS
2001
13 years 7 months ago
The Disappearance of Equation Fifteen, a Richard Cox Mystery
Halpernhas retractedan earlier claimthat Cox'sTheoremis deductivelyunsound,but he has renewedand amplifiedhis objectionsto the reasonablenessof the theoremfor finite domains....
Paul Snow
ICIP
2001
IEEE
14 years 7 months ago
Observer motion estimation and control from optical flow
The information conveyed by optical flow is analytically linked to the observer motion in this paper by decomposing the optical flow field into its vector field components. It is ...
Liangyin Yu, Charles R. Dyer
FLAIRS
2001
13 years 7 months ago
Syntactic-Level Ontology Integration Rules for E-Commerce
Electronic marketplaces, or e-commerce portals, bring together many online suppliers and buyers. Each individual participant can potentially use his own format to represent the pr...
Borys Omelayenko