Sciweavers

44 search results - page 7 / 9
» A First Step Towards Stream Reasoning
Sort
View
POPL
2009
ACM
14 years 6 months ago
Formal certification of code-based cryptographic proofs
As cryptographic proofs have become essentially unverifiable, cryptographers have argued in favor of developing techniques that help tame the complexity of their proofs. Game-base...
Benjamin Grégoire, Gilles Barthe, Santiago ...
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
13 years 11 months ago
Granularity Conscious Modeling for Probabilistic Databases
The convergence of embedded sensor systems and stream query processing suggests an important role for database techniques, in managing data that only partially – and often inacc...
Eirinaios Michelakis, Daisy Zhe Wang, Minos N. Gar...
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
13 years 9 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
SOCIALCOM
2010
13 years 3 months ago
Assessing the Value of Contributions in Tagging Systems
-- Assessing the value of individual users' contributions in peer-production systems is paramount to the design of mechanisms that support collaboration and improve users'...
Elizeu Santos-Neto, Flavio Figueiredo, Jussara M. ...
ICLP
2009
Springer
14 years 6 months ago
Preprocessing for Optimization of Probabilistic-Logic Models for Sequence Analysis
Abstract. A class of probabilistic-logic models is considered, which increases the expressibility from HMM's and SCFG's regular and contextfree languages to, in principle...
Henning Christiansen, Ole Torp Lassen