Sciweavers

2016 search results - page 45 / 404
» Megamaps: Construction and Examples
Sort
View
SIGKDD
2002
90views more  SIGKDD 2002»
15 years 4 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
IIR
2010
15 years 2 months ago
MOWIS: A System for Building Multimedia Ontologies from Web Information Sources
Defining ontologies within the multimedia domain still remains a challenging task, due to the complexity of multimedia data and the related associated knowledge. In this paper, we...
Vincenzo Moscato, Antonio Penta, Fabio Persia, Ant...
APAL
2010
92views more  APAL 2010»
15 years 1 months ago
The eskolemization of universal quantifiers
This paper is a sequel to the papers [4, 6] in which an alternative skolemization method called ekolemization was introduced that, when applied to the strong existential quantifie...
Rosalie Iemhoff
FFA
2011
115views more  FFA 2011»
14 years 11 months ago
Toric residue codes: I
In this paper, we begin exploring the construction of algebraic codes from toric varieties using toric residues. Though algebraic codes have been constructed from toric varieties, ...
Roy Joshua, Reza Akhtar
MPC
1995
Springer
116views Mathematics» more  MPC 1995»
15 years 8 months ago
Computer-Aided Computing
PVS is a highly automated framework for speci cation and veri cation. We show how the language and deduction features of PVS can be used to formalize, mechanize, and apply some us...
Natarajan Shankar