Sciweavers

1779 search results - page 262 / 356
» A Formal Model of Data Privacy
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 4 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
SAC
2004
ACM
15 years 9 months ago
Integrating similarity-based queries in image DBMSs
Until recently, issues in image retrieval have been handled in DBMSs and in computer vision as separate research works. Nowadays, the trend is towards integrating the two approach...
Solomon Atnafu, Richard Chbeir, David Coquil, Lion...
ALT
2007
Springer
16 years 1 months ago
One-Shot Learners Using Negative Counterexamples and Nearest Positive Examples
As some cognitive research suggests, in the process of learning languages, in addition to overt explicit negative evidence, a child often receives covert explicit evidence in form...
Sanjay Jain, Efim B. Kinber
ICECCS
2000
IEEE
135views Hardware» more  ICECCS 2000»
15 years 8 months ago
Definitions of Equivalence for Transformational Synthesis of Embedded Systems
Design of embedded systems is a complex task that requires design cycles founded upon formal notation, so that the synthesis from specification to implementation can be carried ou...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
COLING
2010
14 years 11 months ago
Log-linear weight optimisation via Bayesian Adaptation in Statistical Machine Translation
We present an adaptation technique for statistical machine translation, which applies the well-known Bayesian learning paradigm for adapting the model parameters. Since state-of-t...
Germán Sanchis-Trilles, Francisco Casacuber...