Sciweavers

4762 search results - page 817 / 953
» About the use of protein models
Sort
View
INFOCOM
1995
IEEE
15 years 4 months ago
Usage-Based Pricing of Packet Data Generated by a Heterogeneous User Population
Usage-based pricing of offered traffic to a data network can be an effective technique for congestion control. To gain insight into the benejits usage-based pricing offers, we pro...
Michael L. Honig, Kenneth Steiglitz
SDB
1995
95views Database» more  SDB 1995»
15 years 4 months ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
AFRICACRYPT
2010
Springer
15 years 4 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
DLOG
2008
15 years 3 months ago
Fuzzy Description Logics for Bilateral Matchmaking in e-Marketplaces
We present a novel Fuzzy Description Logic (DL) based approach to automate matchmaking in e-marketplaces. We model traders' preferences with the aid of Fuzzy DLs and, given a ...
Azzurra Ragone, Umberto Straccia, Fernando Bobillo...
LREC
2010
143views Education» more  LREC 2010»
15 years 2 months ago
Determining the Origin and Structure of Person Names
This paper presents a novel system HENNA (Hybrid Person Name Analyzer) for identifying language origin and analyzing linguistic structures of person names. We conduct ME-based cla...
Yu Fu, Feiyu Xu, Hans Uszkoreit