نتایج جستجو برای: hierarchial analysis

تعداد نتایج: 2824219  

2007
Jon P. Knight Martin Hamilton

This paper documents the design and development of a simple le system based inverted index for use in rapid retrieval of information from resource templates in a Subject Based Information Gateway (SBIG) application on the World Wide Web (WWW). The index mechanism trades le system space for speed and ease of implementation. It makes use of the UNIX hierarchial lesystem structure to hold the inde...

2013
Sheng-Gwo Chen Chuan-Sheng Wei Feng Chia Tone-Yau Huang

Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.’s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some ...

2006
Fabrizio Angiulli

A density-based clustering algorithm, called OUTCLUST, is presented. The algorithm exploits a notion of local density in order to find homogeneous groups of objects as opposite to objects mostly deviating from the overall population. The proposed algorithm tries to simultaneously consider several features of real data sets, namely finding clusters of different shapes and densities in high dimen...

2017
Selçuk ARTUT

While the far-fetched ideas brought up with imagination are shedding lights on Science Fiction Movies, occasionally ever-growing technology has been fuelled by these creative inspirations and imaginations. This article reflects on the findings of the data visualization project Dystopia-Utopia (www.dystopia-utopia.com) and investigates the existence of a common discourse that would stand out in ...

Journal: :SIAM J. Scientific Computing 2009
James M. Greenberg Laurent Gosse

In this paper we present algorithms for approximating real bandlimited signals by multiple Gaussian Chirps. These algorithms do not rely on matching pursuit ideas. They are hierarchial and, at each stage, the number of terms in a given approximation depends only on the number of positive-valued maxima and negative-valued minima of a signed amplitude function characterizing part of the signal. L...

2004
Zhaohui Cheng Richard Comley Luminita Vasiu

Key escrow is an inherent property in the current proposed Identity-Based Encryption (IBE) systems. However the key escrow is not always a good property for all applications. In this paper, we present a scheme which removes the key escrow from the IBE system proposed by Bonch and Franklin, while at the same time maintaining some important properties of the IBE. We also present some cryptosystem...

2002
Trevor C. Meyerowitz

We present a tool suite for working with hierarchical bus schedule/arbitration descriptions for nodes sharing a bus in real-time applications. These schedules can be based on a variety of factors including time slicing and the characteristics of messages. These schedules are represented in a tree-like structure. Using this structure we can describe many popular arbitration schemes, and automati...

2008
Barry J. Glick

In the analysis of geocoded statistical data, common practice has been to treat the data in isolation from its locational or spatial characteristics. This results in a potentially critical loss of the spatial information that is contained in the mapped representation of the statisti cal data but not in the application of aspatial statistical techniques such as cross-sectional regression. One ex...

2015
R. RajaLakshmi Dr. T. V. Ananthan

Secured Wireless Networking is done by using an energy efficient routing protocol is the major concern in the field of wireless sensor networks. In this paper we present hybrid energy efficient hierarchial routing protocol which is developed from previous energy balanced routing protocols. Futuristic advancement in this paper also enlightens some of the issues faced by GSTEB and also explains h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید