Sciweavers

2444 search results - page 376 / 489
» Feature Construction for Back-Propagation
Sort
View
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 6 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
DEXA
2008
Springer
123views Database» more  DEXA 2008»
15 years 6 months ago
Evolutionary Clustering in Description Logics: Controlling Concept Formation and Drift in Ontologies
Abstract. We present a method based on clustering techniques to detect concept drift or novelty in a knowledge base expressed in Description Logics. The method exploits an effectiv...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
DLS
2008
165views Languages» more  DLS 2008»
15 years 6 months ago
Filtered dispatch
Predicate dispatching is a generalized form of dynamic dispatch, which has strong limitations when arbitrary predicates of the underlying base language are used. Unlike classes, w...
Pascal Costanza, Charlotte Herzeel, Jorge Vallejos...
DLS
2008
213views Languages» more  DLS 2008»
15 years 6 months ago
A parsing machine for PEGs
Parsing Expression Grammar (PEG) is a recognition-based foundation for describing syntax that renewed interest in top-down parsing approaches. Generally, the implementation of PEG...
Sérgio Medeiros, Roberto Ierusalimschy
DOCENG
2008
ACM
15 years 6 months ago
A concise XML binding framework facilitates practical object-oriented document engineering
Semantic web researchers tend to assume that XML Schema and OWL-S are the correct means for representing the types, structure, and semantics of XML data used for documents and int...
Andruid Kerne, Zachary O. Toups, Blake Dworaczyk, ...