Sciweavers

11 search results - page 2 / 3
» Modular Information Hiding and Type-Safe Linking for C
Sort
View
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 6 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
LLC
2011
120views more  LLC 2011»
13 years 3 days ago
How Talker Identity Relates to Language Processing
Speech carries both linguistic content – phonemes, words, sentences – and talker information, sometimes called ‘indexical information’. While talker variability materially...
Sarah C. Creel, Micah R. Bregman
IICAI
2003
13 years 7 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
MONET
2008
150views more  MONET 2008»
13 years 5 months ago
A Multi-radio 802.11 Mesh Network Architecture
Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the bene...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
ATAL
2006
Springer
13 years 9 months ago
Adaptive agent negotiation via argumentation
In this paper, we study how argumentation can be used as a basis for negotiation between autonomous agents, where negotiation strategies of the different parties are represented a...
Antonis C. Kakas, Pavlos Moraitis