This paper introduces and develops an algebra over triadic relations (relations whose contents are only triples). In essence, the algebra is a severely restricted variation of relational algebra (RA) that is defined o...
详细信息
In this paper we describe a virtual clothing system for retail and design, created for Bodymetrics Ltd., at their request. In the retail setup we installed the system at Selfridges, a well known department store in Lo...
详细信息
XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation on the World Wide Web. However, the large part of data is still stored in a relational database and we ne...
详细信息
We analyze skewing, an approach that has been empirically observed to enable greedy decision tree learners to learn "difficult" Boolean functions, such as parity, in the presence of irrelevant variables. We ...
详细信息
ISBN:
(纸本)1595931805
We analyze skewing, an approach that has been empirically observed to enable greedy decision tree learners to learn "difficult" Boolean functions, such as parity, in the presence of irrelevant variables. We prove that, in an idealized setting, for any function and choice of skew parameters, skewing finds relevant variables with probability 1. We present experiments exploring how different parameter choices affect the success of skewing in empirical settings. Finally, we analyze a variant of skewing called Sequential Skewing.
In this paper a new DFT scheme is proposed suitable for testing mixed signal differential circuits. The proposed testing-scheme is capable of detecting single catastrophic faults injected into the circuit under test. ...
In the paper a novel methodology, TS-U, is proposed based on existing model checking techniques that were extended to successfully model the systems in a ubiquitous environment by introducing time and space constraint...
详细信息
The availability of modern imaging techniques such as Confocal Scanning Laser Tomography (CSLT) for capturing high-quality optic nerve images offer the potential for developing automatic and objective methods for supp...
详细信息
This papers reports the advances in Optical Core networks research coordinated in the framework of the e-Photon/ONe and e-Photon/ONe+ networks of excellence.
ISBN:
(纸本)1424402212
This papers reports the advances in Optical Core networks research coordinated in the framework of the e-Photon/ONe and e-Photon/ONe+ networks of excellence.
This work examines and proposes a new method for web mining inference based on Fuzzy Cognitive Maps. The web mining inference and knowledge extraction consists of two phases. At the first phase the a priori algorithm ...
详细信息
ISBN:
(纸本)8476538723
This work examines and proposes a new method for web mining inference based on Fuzzy Cognitive Maps. The web mining inference and knowledge extraction consists of two phases. At the first phase the a priori algorithm is used for web mining and a collection of Association rules is inferred. In the second phase, the set of Association Rules is transformed into a Fuzzy Cognitive Map (FCM). It investigates a new methodology for developing Fuzzy Cognitive Maps so that they can be suitable for web mining inference.
Being able to express and enforce role-based access control on XML data is a critical component of XML data management. However, given the semi-structured nature of XML, this is non-trivial, as access control can be a...
详细信息
ISBN:
(纸本)1595931406
Being able to express and enforce role-based access control on XML data is a critical component of XML data management. However, given the semi-structured nature of XML, this is non-trivial, as access control can be applied on the values of nodes as well as on the structural relationship between nodes. In this context, we adopt and extend a graph editing language for specifying role-based access constraints in the form of security views. A Security Annotated Schema (SAS) is proposed as the internal representation for the security views and can be automatically constructed from the original schema and the security view specification. To enforce the access constraints on user queries, we propose Secure Query Rewrite (SQR) - a set of rules that can be used to rewrite a user XPath query on the security view into an equivalent XQuery expression against the original data, with the guarantee that the users only see information in the view but not any data that was blocked. Experimental evaluation demonstrates the efficiency and the expressiveness of our approach.
暂无评论