Sciweavers

4426 search results - page 744 / 886
» Concurrent Constraint Programming
Sort
View
153
Voted
JCS
2010
124views more  JCS 2010»
15 years 3 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
142
Voted
ACL
2010
15 years 2 months ago
Automatic Generation of Story Highlights
In this paper we present a joint content selection and compression model for single-document summarization. The model operates over a phrase-based representation of the source doc...
Kristian Woodsend, Mirella Lapata
170
Voted
ICANN
2009
Springer
15 years 2 months ago
MINLIP: Efficient Learning of Transformation Models
Abstract. This paper studies a risk minimization approach to estimate a transformation model from noisy observations. It is argued that transformation models are a natural candidat...
Vanya Van Belle, Kristiaan Pelckmans, Johan A. K. ...
CCE
2011
14 years 11 months ago
Optimization-based design of reactive distillation columns using a memetic algorithm
This contribution deals with the optimization of the design of reactive distillation columns by using a memetic algorithm (MA) which is a combination of an evolution strategy (ES)...
Maren Urselmann, S. Barkmann, Guido Sand, Sebastia...
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
16 years 5 months ago
Privacy: Theory meets Practice on the Map
In this paper, we propose the first formal privacy analysis of a data anonymization process known as the synthetic data generation, a technique becoming popular in the statistics c...
Ashwin Machanavajjhala, Daniel Kifer, John M. Abow...