Sciweavers

4150 search results - page 737 / 830
» A Practical Approach to Model Extension
Sort
View
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 1 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
COMAD
2008
15 years 1 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
LREC
2010
237views Education» more  LREC 2010»
15 years 1 months ago
Flexible Ontology Population from Text: The OwlExporter
Ontology population from text is becoming increasingly important for NLP applications. Ontologies in OWL format provide for a standardized means of modeling, querying, and reasoni...
René Witte, Ninus Khamis, Juergen Rilling
IJCAI
2007
15 years 1 months ago
Simple Training of Dependency Parsers via Structured Boosting
Recently, significant progress has been made on learning structured predictors via coordinated training algorithms such as conditional random fields and maximum margin Markov ne...
Qin Iris Wang, Dekang Lin, Dale Schuurmans
AAAI
2006
15 years 1 months ago
Diagnosis of Multi-Robot Coordination Failures Using Distributed CSP Algorithms
With increasing deployment of systems involving multiple coordinating agents, there is a growing need for diagnosing coordination failures in such systems. Previous work presented...
Meir Kalech, Gal A. Kaminka, Amnon Meisels, Yehuda...