Sciweavers

1517 search results - page 223 / 304
» On automatic knowledge validation for Bayesian knowledge bas...
Sort
View
IACR
2011
97views more  IACR 2011»
12 years 8 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
KDD
1997
ACM
154views Data Mining» more  KDD 1997»
14 years 15 days ago
Autonomous Discovery of Reliable Exception Rules
This paper presents an autonomous algorithm for discovering exception rules from data sets. An exception rule, which is defined as a deviational pattern to a well-known fact, exhi...
Einoshin Suzuki
JSS
2006
59views more  JSS 2006»
13 years 9 months ago
A survey of architecture design rationale
Many claims have been made about the consequences of not documenting design rationale. The general perception is that designers and architects usually do not fully understand the ...
Antony Tang, Muhammad Ali Babar, Ian Gorton, Jun H...
EKAW
2010
Springer
13 years 7 months ago
Ontology Engineering with Rough Concepts and Instances
A scenario in ontology development and its use is hypothesis testing, such as finding new subconcepts based on the data linked to the ontology. During such experimentation, knowle...
C. Maria Keet
ISPASS
2009
IEEE
14 years 3 months ago
Machine learning based online performance prediction for runtime parallelization and task scheduling
—With the emerging many-core paradigm, parallel programming must extend beyond its traditional realm of scientific applications. Converting existing sequential applications as w...
Jiangtian Li, Xiaosong Ma, Karan Singh, Martin Sch...