Sciweavers

236 search results - page 33 / 48
» From Weak to Strong Watermarking
Sort
View
PODS
1999
ACM
160views Database» more  PODS 1999»
14 years 2 months ago
Queries with Incomplete Answers over Semistructured Data
Semistructured data occur in situations where information lacks a homogeneous structure and is incomplete. Yet, up to now the incompleteness of information has not been re ected b...
Yaron Kanza, Werner Nutt, Yehoshua Sagiv
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 10 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
TCS
2008
13 years 9 months ago
Arbitrary pattern formation by asynchronous, anonymous, oblivious robots
From an engineering point of view, the problem of coordinating a set of autonomous, mobile robots for the purpose of cooperatively performing a task has been studied extensively o...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro...
CVPR
2006
IEEE
14 years 12 months ago
Applying Ensembles of Multilinear Classifiers in the Frequency Domain
Ensemble methods such as bootstrap, bagging or boosting have had a considerable impact on recent developments in machine learning, pattern recognition and computer vision. Theoret...
Christian Bauckhage, Thomas Käster, John K. T...
CATE
2004
133views Education» more  CATE 2004»
13 years 11 months ago
Semi-Automatic Evaluation Features in Computer-assisted Essay Assessment
The role of assessment and evaluation has recently changed in a way which will have fundamental consequences in applying information and communication technologies (ICTs) to analy...
Tuomo Kakkonen, Niko Myller, Erkki Sutinen