Sciweavers

5344 search results - page 1027 / 1069
» Privacy-Preserving Set Operations
Sort
View
IFIP3
1998
151views Education» more  IFIP3 1998»
13 years 11 months ago
Conceptual Workflow Modelling for Remote Courses
Development of a wide spread project intended to teaching Computer Science, integrating a considerable number of students all over a country with big geographical extension and sc...
José Palazzo M. de Oliveira, Mariano Nicola...
COOTS
1997
13 years 11 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
PAKM
1998
13 years 11 months ago
Knowledge Management: A Text Mining Approach
Knowledge Discovery in Databases (KDD), also known as data mining, focuses on the computerized exploration of large amounts of data and on the discovery of interesting patterns wi...
Ronen Feldman, Moshe Fresko, Haym Hirsh, Yonatan A...
IJCAI
1997
13 years 11 months ago
Reasoning about Concurrent Execution Prioritized Interrupts, and Exogenous Actions in the Situation Calculus
As an alternative to planning, an approach to highlevel agent control based on concurrent program execution is considered. A formal definition in the situation calculus of such a ...
Giuseppe De Giacomo, Yves Lespérance, Hecto...
NIPS
1997
13 years 11 months ago
Learning Generative Models with the Up-Propagation Algorithm
Up-propagation is an algorithm for inverting and learning neural network generative models. Sensory input is processed by inverting a model that generates patterns from hidden var...
Jong-Hoon Oh, H. Sebastian Seung
« Prev « First page 1027 / 1069 Last » Next »