Sciweavers

171 search results - page 22 / 35
» Privacy-preserving global customization
Sort
View
ECIS
2000
13 years 8 months ago
IT-Enabled Sophistication Banking
- Globalization of financial markets resulting from both IT (particularly internet standards) and increasing homogeneity of regulation has strongly affected the environment, financ...
Hans Ulrich Buhl, Dennis Kundisch, Andreas Leinfel...
ANLP
1994
98views more  ANLP 1994»
13 years 8 months ago
Combination of Symbolic and Statistical Approaches for Grammatical Knowledge Acquisition
The framework we adopted for customizing linguistic knowledge to individual application domains is an integration of symbolic and statistical approaches. In order to acquire domai...
Masaki Kiyono, Jun-ichi Tsujii
CGF
2010
113views more  CGF 2010»
13 years 7 months ago
Signing the Unsigned: Robust Surface Reconstruction from Raw Pointsets
We propose a modular framework for robust 3D reconstruction from unorganized, unoriented, noisy, and outlierridden geometric data. We gain robustness and scalability over previous...
Patrick Mullen, Fernando de Goes, Mathieu Desbrun,...
ICCAD
2005
IEEE
141views Hardware» more  ICCAD 2005»
14 years 4 months ago
Architecture and compilation for data bandwidth improvement in configurable embedded processors
Many commercially available embedded processors are capable of extending their base instruction set for a specific domain of applications. While steady progress has been made in t...
Jason Cong, Guoling Han, Zhiru Zhang
ASIACRYPT
2007
Springer
14 years 1 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...