Sciweavers

274 search results - page 52 / 55
» An Alternative to Deep Case for Representing Relational Info...
Sort
View
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 6 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
CIKM
2007
Springer
14 years 1 months ago
A volcano erupts: semantically mediated integration of heterogeneous volcanic and atmospheric data
We present a research effort into the application of semantic web methods and technologies to address the challenging problem of integrating heterogeneous volcanic and atmospheri...
Peter Fox, Deborah L. McGuinness, Robert Raskin, A...
IJWIS
2007
181views more  IJWIS 2007»
13 years 7 months ago
Answering queries over incomplete data stream histories
Streams of data often originate from many distributed sources. A distributed stream processing system publishes such streams of data and enables queries over the streams. This allo...
Alasdair J. G. Gray, Werner Nutt, M. Howard Willia...
BMCBI
2008
115views more  BMCBI 2008»
13 years 7 months ago
Principal components analysis based methodology to identify differentially expressed genes in time-course microarray data
Background: Time-course microarray experiments are being increasingly used to characterize dynamic biological processes. In these experiments, the goal is to identify genes differ...
Sudhakar Jonnalagadda, Rajagopalan Srinivasan
TPLP
2002
117views more  TPLP 2002»
13 years 6 months ago
On Properties of Update Sequences Based on Causal Rejection
In this paper, we consider an approach to update nonmonotonic knowledge bases represented as extended logic programs under the answer set semantics. In this approach, new informat...
Thomas Eiter, Michael Fink, Giuliana Sabbatini, Ha...