Sciweavers

761 search results - page 110 / 153
» A Reactive Approach to Explanation
Sort
View
KDD
2003
ACM
133views Data Mining» more  KDD 2003»
16 years 7 days ago
Interactive Analysis of Gene Interactions Using Graphical gaussian model
DNA microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Xintao Wu, Yong Ye, Kalpathi R. Subramanian
PODS
2005
ACM
119views Database» more  PODS 2005»
15 years 12 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ICIAP
2007
ACM
15 years 12 months ago
A Consistency Result for the Normalized Eight-Point Algorithm
A recently proposed argument to explain the improved performance of the eight-point algorithm that results from using normalized data [IEEE Trans. Pattern Anal. Mach. Intell., 25(...
Wojciech Chojnacki, Michael J. Brooks
ICS
2010
Tsinghua U.
15 years 9 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
ICDE
2010
IEEE
236views Database» more  ICDE 2010»
15 years 9 months ago
Explaining Structured Queries in Natural Language
— Many applications offer a form-based environment for na¨ıve users for accessing databases without being familiar with the database schema or a structured query language. User...
Alkis Simitsis, Georgia Koutrika, Yannis E. Ioanni...