Sciweavers

882 search results - page 13 / 177
» Visibility-driven transfer functions
Sort
View
TCC
2005
Springer
95views Cryptology» more  TCC 2005»
14 years 1 months ago
Keyword Search and Oblivious Pseudorandom Functions
We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are ...
Michael J. Freedman, Yuval Ishai, Benny Pinkas, Om...
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
14 years 3 days ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 2 months ago
Breaching the Knowledge Transfer Blockade in IT Offshore Outsourcing Projects - A Case from the Financial Services Industry
In this paper the authors present the results of a research project that strives to fill a literature gap in IT offshore outsourcing research by analyzing clientside managerial me...
Robert Gregory, Roman Beck, Michael Prifling
ECML
2007
Springer
14 years 1 months ago
Transfer Learning in Reinforcement Learning Problems Through Partial Policy Recycling
In this paper we investigate the relation between transfer learning in reinforcement learning with function approximation and supervised learning with concept drift. We present a n...
Jan Ramon, Kurt Driessens, Tom Croonenborghs
SI3D
2006
ACM
14 years 1 months ago
Normal mapping for precomputed radiance transfer
Normal mapping is a variant of bump mapping that is commonly used in computer games. It models complex surface variations by explicitly storing a surface normal in a texture map. ...
Peter-Pike J. Sloan