Sciweavers

934 search results - page 56 / 187
» exact 2007
Sort
View
IANDC
2007
106views more  IANDC 2007»
15 years 4 months ago
Extended visual cryptography schemes
Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image ...
Andreas Klein, Markus Wessler
IDA
2007
Springer
15 years 4 months ago
Approximate mining of frequent patterns on streams
Abstract. This paper introduces a new algorithm for approximate mining of frequent patterns from streams of transactions using a limited amount of memory. The proposed algorithm co...
Claudio Silvestri, Salvatore Orlando
ICDE
2007
IEEE
337views Database» more  ICDE 2007»
16 years 5 months ago
The New Casper: A Privacy-Aware Location-Based Database Server
This demo presents Casper; a framework in which users entertain anonymous location-based services. Casper consists of two main components; the location anonymizer that blurs the u...
Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref
JCT
2007
112views more  JCT 2007»
15 years 4 months ago
Bruhat intervals as rooks on skew Ferrers boards
We characterise the permutations π such that the elements in the closed lower Bruhat interval [id,π] of the symmetric group correspond to non-taking rook configurations on a sk...
Jonas Sjöstrand
PKDD
2007
Springer
131views Data Mining» more  PKDD 2007»
15 years 10 months ago
Expectation Propagation for Rating Players in Sports Competitions
Abstract. Rating players in sports competitions based on game results is one example of paired comparison data analysis. Since an exact Bayesian treatment is intractable, several t...
Adriana Birlutiu, Tom Heskes