Sciweavers

11 search results - page 2 / 3
» Modular Information Hiding and Type-Safe Linking for C
Sort
View
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 6 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung
LLC
2011
120views more  LLC 2011»
13 years 16 days ago
How Talker Identity Relates to Language Processing
Speech carries both linguistic content – phonemes, words, sentences – and talker information, sometimes called ‘indexical information’. While talker variability materially...
Sarah C. Creel, Micah R. Bregman
IICAI
2003
13 years 7 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
MONET
2008
150views more  MONET 2008»
13 years 6 months ago
A Multi-radio 802.11 Mesh Network Architecture
Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the bene...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
ATAL
2006
Springer
13 years 9 months ago
Adaptive agent negotiation via argumentation
In this paper, we study how argumentation can be used as a basis for negotiation between autonomous agents, where negotiation strategies of the different parties are represented a...
Antonis C. Kakas, Pavlos Moraitis