Sciweavers

342 search results - page 66 / 69
» Calling context abstraction with shapes
Sort
View
NDQA
2003
129views Education» more  NDQA 2003»
13 years 7 months ago
Knowledge Tracking: Answering Implicit Questions
Research on Question Answering has produced an arsenal of useful techniques for detecting answers that are explicitly present in the text of a collection of documents. To move bey...
Reinhard Stolle, Daniel G. Bobrow, Cleo Condoravdi...
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
ICDE
2010
IEEE
167views Database» more  ICDE 2010»
13 years 6 months ago
Top-k pipe join
Abstract—In the context of service composition and orchestration, service invocation is typically scheduled according to execution plans, whose topology establishes whether diffe...
Davide Martinenghi, Marco Tagliasacchi
AMAI
2007
Springer
13 years 5 months ago
Relational concept discovery in structured datasets
Relational datasets, i.e., datasets in which individuals are described both by their own features and by their relations to other individuals, arise from various sources such as d...
Marianne Huchard, Mohamed Rouane Hacene, Cyril Rou...
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 5 months ago
Optimal power allocation for downstream xDSL with per-modem total power constraints : Broadcast Channel Optimal Spectrum Balanci
Abstract-Recently, the duality between Multiple Input Multiple Output (MIMO) Multiple Access Channels (MAC) and MIMO Broadcast Channels (BC) has been established under a total powe...
Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun...