Sciweavers

885 search results - page 137 / 177
» On Additive and Multiplicative Fuzzy Models
Sort
View
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
14 years 2 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
APPROX
2004
Springer
122views Algorithms» more  APPROX 2004»
14 years 2 months ago
Maximum Coverage Problem with Group Budget Constraints and Applications
We study a variant of the maximum coverage problem which we label the maximum coverage problem with group budget constraints (MCG). We are given a collection of sets S = {S1, S2, ....
Chandra Chekuri, Amit Kumar
CEAS
2004
Springer
14 years 2 months ago
Extracting social networks and contact information from email and the Web
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
Aron Culotta, Ron Bekkerman, Andrew McCallum
DAGM
2004
Springer
14 years 2 months ago
Building a Motion Resolution Pyramid by Combining Velocity Distributions
Abstract. Velocity distributions are an enhanced representation of image velocity implying more velocity information than velocity vectors. Velocity distributions allow the represe...
Julian Eggert, Volker Willert, Edgar Körner
COOPIS
2003
IEEE
14 years 2 months ago
Re-factoring Middleware Systems: A Case Study
Abstract. Aspect oriented programming brings us new design perspectives since it permits the superimpositions of multiple abstraction models on top of one another. It is a very pow...
Charles Zhang, Hans-Arno Jacobsen