Sciweavers

70 search results - page 6 / 14
» Proof-of-Knowledge of Representation of Committed Value and ...
Sort
View
ISSA
2008
13 years 9 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier
NIPS
1993
13 years 8 months ago
Surface Learning with Applications to Lipreading
Most connectionist research has focused on learning mappings from one space to another (eg. classification and regression). This paper introduces the more general task of learnin...
Christoph Bregler, Stephen M. Omohundro
DEXA
2005
Springer
110views Database» more  DEXA 2005»
14 years 1 months ago
Intensional Encapsulations of Database Subsets via Genetic Programming
Finding intensional encapsulations of database subsets is the inverse of query evaluation. Whereas query evaluation transforms an intensional expression (the query) to its extensi...
Aybar C. Acar, Amihai Motro
FLAIRS
2003
13 years 9 months ago
Soft CLP (FD)
Over-constrained problems can be solved with the help of soft constraints. Weighted constraints are a typical representation of soft constraints used to minimize weights of unsati...
Hana Rudová
DBPL
1989
Springer
165views Database» more  DBPL 1989»
13 years 11 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...