Sciweavers

479 search results - page 79 / 96
» Discrepancy Analysis of Complex Objects Using Dissimilaritie...
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
SIGDOC
2005
ACM
14 years 1 months ago
Metadata based authoring for technical documentation
The creation process of technical documentation is an expensive and time-consuming task especially for complex products. To make this process more cost-efficient computerized supp...
Ingo Stock, Michael Weber, Eckhard Steinmeier
FC
2005
Springer
142views Cryptology» more  FC 2005»
14 years 1 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
MOMM
2009
ACM
162views Communications» more  MOMM 2009»
14 years 11 days ago
Towards an interactive multimedia experience for club music and dance
In this paper, we describe completed and ongoing work towards an interactive multimedia system that will appeal to today’s youth culture identified as most likely to adopt such ...
Dennis Majoe, Irena Kulka, Jan Schacher
ECML
2006
Springer
13 years 11 months ago
Unsupervised Multiple-Instance Learning for Functional Profiling of Genomic Data
Multiple-instance learning (MIL) is a popular concept among the AI community to support supervised learning applications in situations where only incomplete knowledge is available....
Corneliu Henegar, Karine Clément, Jean-Dani...