Sciweavers

265 search results - page 49 / 53
» On the Intersection of XPath Expressions
Sort
View
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 27 days ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
IPMU
2010
Springer
14 years 4 days ago
Plateau Regions: An Implementation Concept for Fuzzy Regions in Spatial Databases and GIS
Abstract. Many geographical applications need to model spatial phenomena with vague or indeterminate boundaries and interiors. A popular paradigm adopted by the GIS community for t...
Virupaksha Kanjilal, Hechen Liu, Markus Schneider
DIAGRAMS
2000
Springer
13 years 11 months ago
Positive Semantics of Projections in Venn-Euler Diagrams
Venn diagrams and Euler circles have long been used as a means of expressing relationships among sets using visual metaphors such as \disjointness" and \containment" of t...
Joseph Gil, John Howse, Elena Tulchinsky
DBPL
1999
Springer
114views Database» more  DBPL 1999»
13 years 11 months ago
Structured Document Transformations Based on XSL
Abstract. Based on the recursion mechanism of the XML transformation language XSL, the document transformation language DTL is defined. First the instantiation DTLreg is considere...
Sebastian Maneth, Frank Neven
FOSSACS
2009
Springer
13 years 11 months ago
On Omega-Languages Defined by Mean-Payoff Conditions
In quantitative verification, system states/transitions have associated costs, and these are used to associate mean-payoff costs with infinite behaviors. In this paper, we propose ...
Rajeev Alur, Aldric Degorre, Oded Maler, Gera Weis...