Sciweavers

13383 search results - page 2612 / 2677
» Abstractions from proofs
Sort
View
DSS
2007
226views more  DSS 2007»
13 years 10 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
KER
2008
193views more  KER 2008»
13 years 10 months ago
The 1st international workshop on computational social choice
Computational social choice is a new discipline currently emerging at the interface of social choice theory and computer science. It is concerned with the application of computati...
Ulle Endriss
KES
2008
Springer
13 years 10 months ago
Classification and Retrieval through Semantic Kernels
Abstract. This work proposes a family of language-independent semantic kernel functions defined for individuals in an ontology. This allows exploiting wellfounded kernel methods fo...
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
KI
2008
Springer
13 years 10 months ago
Wayfinding in Scene Space
Many environments in which humans wayfind can be conveniently abstracted as networks or graphs: structures of nodes that are interconnected by edges. Examples include the street ne...
Urs-Jakob Rüetschi
JSAC
2006
112views more  JSAC 2006»
13 years 10 months ago
Network Kriging
ABSTRACT. Network service providers and customers are often concerned with aggregate performance measures that span multiple network paths. Unfortunately, forming such network-wide...
David B. Chua, Eric D. Kolaczyk, Mark Crovella
« Prev « First page 2612 / 2677 Last » Next »