Sciweavers

873 search results - page 51 / 175
» step 2005
Sort
View
WWW
2005
ACM
16 years 16 days ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
STOC
2005
ACM
133views Algorithms» more  STOC 2005»
16 years 5 days ago
An O(log n log log n) space algorithm for undirected st-connectivity
Abstract. We present a deterministic O(log n log log n) space algorithm for undirected stconnectivity. It is based on a space-efficient simulation of the deterministic EREW algorit...
Vladimir Trifonov
ICIAP
2005
ACM
15 years 12 months ago
Time and Date OCR in CCTV Video
Automatic recognition of time and date stamps in CCTV video enables the inclusion of time-based queries in video indexing applications. Such ability needs to deal with problems of ...
Ginés García-Mateos, Andrés G...
PERCOM
2005
ACM
15 years 11 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
DCC
2005
IEEE
15 years 11 months ago
Asymptotics of the Entropy Rate for a Hidden Markov Process
We calculate the Shannon entropy rate of a binary Hidden Markov Process (HMP), of given transition rate and noise (emission), as a series expansion in . The first two orders are ca...
Or Zuk, Ido Kanter, Eytan Domany