نتایج جستجو برای: hierarchial analysis
تعداد نتایج: 2824219 فیلتر نتایج به سال:
This paper documents the design and development of a simple le system based inverted index for use in rapid retrieval of information from resource templates in a Subject Based Information Gateway (SBIG) application on the World Wide Web (WWW). The index mechanism trades le system space for speed and ease of implementation. It makes use of the UNIX hierarchial lesystem structure to hold the inde...
Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.’s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some ...
A density-based clustering algorithm, called OUTCLUST, is presented. The algorithm exploits a notion of local density in order to find homogeneous groups of objects as opposite to objects mostly deviating from the overall population. The proposed algorithm tries to simultaneously consider several features of real data sets, namely finding clusters of different shapes and densities in high dimen...
While the far-fetched ideas brought up with imagination are shedding lights on Science Fiction Movies, occasionally ever-growing technology has been fuelled by these creative inspirations and imaginations. This article reflects on the findings of the data visualization project Dystopia-Utopia (www.dystopia-utopia.com) and investigates the existence of a common discourse that would stand out in ...
In this paper we present algorithms for approximating real bandlimited signals by multiple Gaussian Chirps. These algorithms do not rely on matching pursuit ideas. They are hierarchial and, at each stage, the number of terms in a given approximation depends only on the number of positive-valued maxima and negative-valued minima of a signed amplitude function characterizing part of the signal. L...
Key escrow is an inherent property in the current proposed Identity-Based Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystem...
We present a tool suite for working with hierarchical bus schedule/arbitration descriptions for nodes sharing a bus in real-time applications. These schedules can be based on a variety of factors including time slicing and the characteristics of messages. These schedules are represented in a tree-like structure. Using this structure we can describe many popular arbitration schemes, and automati...
In the analysis of geocoded statistical data, common practice has been to treat the data in isolation from its locational or spatial characteristics. This results in a potentially critical loss of the spatial information that is contained in the mapped representation of the statisti cal data but not in the application of aspatial statistical techniques such as cross-sectional regression. One ex...
Secured Wireless Networking is done by using an energy efficient routing protocol is the major concern in the field of wireless sensor networks. In this paper we present hybrid energy efficient hierarchial routing protocol which is developed from previous energy balanced routing protocols. Futuristic advancement in this paper also enlightens some of the issues faced by GSTEB and also explains h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید