Sciweavers

1995 search results - page 204 / 399
» What's the Problem
Sort
View
157
Voted
SACRYPT
2009
Springer
150views Cryptology» more  SACRYPT 2009»
15 years 11 months ago
Information Theoretically Secure Multi Party Set Intersection Re-visited
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
SAGT
2009
Springer
112views Game Theory» more  SAGT 2009»
15 years 11 months ago
On the Complexity of Iterated Weak Dominance in Constant-Sum Games
Abstract. In game theory, a player’s action is said to be weakly dominated if there exists another action that, with respect to what the other players do, is never worse and some...
Felix Brandt, Markus Brill, Felix A. Fischer, Paul...
129
Voted
SEMWEB
2009
Springer
15 years 11 months ago
Towards Integrity Constraints in OWL
In many data-centric applications, it is desirable to use OWL as an expressive schema language with which one expresses constraints that must be satisfied by instance data. Howeve...
Evren Sirin, Jiao Tao
149
Voted
CISS
2008
IEEE
15 years 11 months ago
A linear integer programming approach to analyze P2P media streaming
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analy...
Fulu Li, Jianwei Huang, Andrew Lippman
147
Voted
ICPR
2008
IEEE
15 years 11 months ago
Grading nuclear pleomorphism on histological micrographs
A mainstay in cancer diagnostics is the classification or grading of cell nuclei based on their appearance. While the analysis of cytological samples has been automated successful...
Eric Cosatto, Matthew Miller, Hans Peter Graf, Joh...