Sciweavers

644 search results - page 16 / 129
» A topological characterization of weakness
Sort
View
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
15 years 10 months ago
Named entity mining from click-through data using weakly supervised latent dirichlet allocation
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Gu Xu, Shuang-Hong Yang, Hang Li
ICDT
1997
ACM
89views Database» more  ICDT 1997»
15 years 1 months ago
On Topological Elementary Equivalence of Spatial Databases
We consider spatial databases and queries definable using first-order logic and real polynomial inequalities. We are interested in topological queries: queries whose result only ...
Bart Kuijpers, Jan Paredaens, Jan Van den Bussche
ENTCS
2007
80views more  ENTCS 2007»
14 years 9 months ago
Topological Perspective on the Hybrid Proof Rules
We consider the non-orthodox proof rules of hybrid logic from the viewpoint of topological semantics. Topological semantics is more general than Kripke semantics. We show that the...
Balder ten Cate, Tadeusz Litak
CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
15 years 2 months ago
Weak Key Authenticity and the Computational Completeness of Formal Encryption
Abstract. A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this dire...
Omer Horvitz, Virgil D. Gligor
LICS
2002
IEEE
15 years 2 months ago
The Metric Analogue of Weak Bisimulation for Probabilistic Processes
We observe that equivalence is not a robust concept in the presence of numerical information - such as probabilities - in the model. We develop a metric analogue of weak bisimulat...
Josee Desharnais, Radha Jagadeesan, Vineet Gupta, ...