Sciweavers

925 search results - page 60 / 185
» A Solution to the Extended GCD Problem
Sort
View
JODS
2008
179views Data Mining» more  JODS 2008»
13 years 9 months ago
A Cooperative Approach for Composite Ontology Mapping
This paper proposes a cooperative approach for composite ontology mapping. We first present an extended classification of automated ontology matching and propose an automatic compo...
Cássia Trojahn dos Santos, Márcia Cr...
ML
2002
ACM
146views Machine Learning» more  ML 2002»
13 years 8 months ago
Kernel Matching Pursuit
Matching Pursuit algorithms learn a function that is a weighted sum of basis functions, by sequentially appending functions to an initially empty basis, to approximate a target fu...
Pascal Vincent, Yoshua Bengio
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
Combining GPS and GSM Cell-ID positioning for Proactive Location-based Services
—Mobile terminals with built-in GPS receivers are becoming more and more available, thus the public deployment of location-based services (LBS) becomes feasible. Upcoming LBS are...
Nico Deblauwe, Peter Ruppel
IACR
2011
73views more  IACR 2011»
12 years 8 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
NOMS
2008
IEEE
14 years 3 months ago
A novel approach to bottleneck analysis in networks
—In this paper∗ , we devise a novel method for bottleneck analysis of UDP networks based on the concept of network utility maximization. To determine the losses on the links in...
Nikhil Shetty, Assane Gueye, Jean C. Walrand