Sciweavers

180 search results - page 18 / 36
» How to safely close a discussion
Sort
View
FC
2005
Springer
88views Cryptology» more  FC 2005»
14 years 1 months ago
Small Coalitions Cannot Manipulate Voting
We demonstrate how to make voting protocols resistant against manipulation by computationally bounded malicious voters, by extending the previous results of Conitzer and Sandholm i...
Edith Elkind, Helger Lipmaa
ICDT
1997
ACM
90views Database» more  ICDT 1997»
14 years 23 hour ago
Adding Structure to Unstructured Data
We develop a new schema for unstructured data. Traditional schemas resemble the type systems of programming languages. For unstructured data, however, the underlying type may be mu...
Peter Buneman, Susan B. Davidson, Mary F. Fernande...
HOPL
2007
13 years 11 months ago
Statecharts in the making: a personal account
This paper is a highly personal and subjective account of how the language of statecharts came into being. The main novelty of the language is in being a fully executable visual f...
David Harel
ESANN
2007
13 years 9 months ago
Mixtures of robust probabilistic principal component analyzers
Mixtures of probabilistic principal component analyzers model high-dimensional nonlinear data by combining local linear models. Each mixture component is specifically designed to...
Cédric Archambeau, Nicolas Delannay, Michel...
IJON
2008
93views more  IJON 2008»
13 years 7 months ago
Morphologically constrained ICA for extracting weak temporally correlated signals
Recently the constrained ICA (cICA) algorithm has been widely applied to many applications. But a crucial problem to the algorithm is how to design a reference signal in advance, ...
Zhi-Lin Zhang