Sciweavers

5344 search results - page 1011 / 1069
» Privacy-Preserving Set Operations
Sort
View
CTCS
1989
Springer
14 years 2 months ago
Quantitative Domains, Groupoids and Linear Logic
We introduce the notion of a candidate for “multiple valued universal constructions” and define stable functors (which generalise functors with left adjoints) in terms of fac...
Paul Taylor 0002
SP
1989
IEEE
14 years 2 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
DAS
2010
Springer
14 years 2 months ago
Nearest neighbor based collection OCR
Conventional optical character recognition (OCR) systems operate on individual characters and words, and do not normally exploit document or collection context. We describe a Coll...
K. Pramod Sankar, C. V. Jawahar, Raghavan Manmatha
ACMACE
2007
ACM
14 years 2 months ago
Pinocchio: conducting a virtual symphony orchestra
We present a system that allows users of any skill to conduct a virtual orchestra. Tempo and volume of the orchestra's performance are influenced with a baton. Pinocchio work...
Bernd Bruegge, Christoph Teschner, Peter Lachenmai...
ICDT
2010
ACM
180views Database» more  ICDT 2010»
14 years 2 months ago
Composing local-as-view mappings: closure and applications
Schema mapping composition is a fundamental operation in schema management and data exchange. The mapping composition problem has been extensively studied for a number of mapping ...
Patricia C. Arocena, Ariel Fuxman, Renée J....
« Prev « First page 1011 / 1069 Last » Next »