Sciweavers

198 search results - page 32 / 40
» Weak Probabilistic Anonymity
Sort
View
EMNLP
2011
12 years 8 months ago
Structured Relation Discovery using Generative Models
We explore unsupervised approaches to relation extraction between two named entities; for instance, the semantic bornIn relation between a person and location entity. Concretely, ...
Limin Yao, Aria Haghighi, Sebastian Riedel, Andrew...
CVPR
2012
IEEE
11 years 11 months ago
Multi-class cosegmentation
Bottom-up, fully unsupervised segmentation remains a daunting challenge for computer vision. In the cosegmentation context, on the other hand, the availability of multiple images ...
Armand Joulin, Francis Bach, Jean Ponce
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
14 years 2 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
VLDB
1994
ACM
126views Database» more  VLDB 1994»
14 years 1 months ago
Building a Laboratory Information System Around a C++-Based Object-Oriented DBMS
MapBase is a laboratory information system that has been supporting a high-throughput genome-mapping operation for the last three years. We chose to build MapBase around a C++-bas...
Nathan Goodman, Steve Rozen, Lincoln Stein
WDAG
2010
Springer
185views Algorithms» more  WDAG 2010»
13 years 7 months ago
Leader Election Problem versus Pattern Formation Problem
Leader election and arbitrary pattern formation are fundammental tasks for a set of autonomous mobile robots. The former consists in distinguishing a unique robot, called the lead...
Yoann Dieudonné, Franck Petit, Vincent Vill...