Sciweavers

1302 search results - page 96 / 261
» Fair Equivalence Relations
Sort
View
WISE
2007
Springer
14 years 4 months ago
On Tree Pattern Query Rewriting Using Views
We study and present our findings on two closely related problems on xpath rewriting using views when both the view and the query are tree patterns involving /,// and []. First, g...
Junhu Wang, Jeffrey Xu Yu, Chengfei Liu
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
14 years 3 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
COLT
1993
Springer
14 years 2 months ago
Parameterized Learning Complexity
We describe three applications in computational learning theory of techniques and ideas recently introduced in the study of parameterized computational complexity. (1) Using param...
Rodney G. Downey, Patricia A. Evans, Michael R. Fe...
TREC
2000
13 years 11 months ago
TREC-9 CLIR at CUHK: Disambiguation by Similarity Values Between Adjacent Words
We investigated the dictionary-based query translation method combining the translation disambiguation process using statistic cooccurrence information trained from the provided c...
Honglan Jin, Kam-Fai Wong
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 10 months ago
Reductions Between Expansion Problems
The Small-Set Expansion Hypothesis (Raghavendra, Steurer, STOC 2010) is a natural hardness assumption concerning the problem of approximating the edge expansion of small sets in g...
Prasad Raghavendra, David Steurer, Madhur Tulsiani