Sciweavers

15254 search results - page 52 / 3051
» A k
Sort
View
BNCOD
2008
88views Database» more  BNCOD 2008»
14 years 11 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao
DC
2001
14 years 11 months ago
Effective Retrieval of Educational Resources by Using Learning Object Metadata for K-12 Schools in Japan
We have customized learning object metadata (LOM) for educational resources on the basis of the LOM investigated by IEEE [1] and IMS [2], in order to make it consistent with Japan...
Masanori Shinohara, Mayumi Okamoto, Yasuhiro Okui,...
OPODIS
2004
14 years 11 months ago
Directional Versus Omnidirectional Antennas for Energy Consumption and k-Connectivity of Networks of Sensors
A network is k-connected if it remains connected after the removal of any k - 1 of its nodes. Assume that n sensors, modeled here as (omni)directional antennas, are dropped random...
Evangelos Kranakis, Danny Krizanc, Eric Williams
NIPS
1994
14 years 11 months ago
Learning Stochastic Perceptrons Under k-Blocking Distributions
We present a statistical method that PAC learns the class of stochastic perceptrons with arbitrary monotonic activation function and weights wi {-1, 0, +1} when the probability d...
Mario Marchand, Saeed Hadjifaradji
ICGI
2010
Springer
14 years 10 months ago
Enhanced Suffix Arrays as Language Models: Virtual k-Testable Languages
Abstract. In this article, we propose the use of suffix arrays to efficiently implement n-gram language models with practically unlimited size n. This approach, which is used with ...
Herman Stehouwer, Menno van Zaanen