Sciweavers

10819 search results - page 1915 / 2164
» Addition and multiplication of sets
Sort
View
138
Voted
JIDM
2010
160views more  JIDM 2010»
14 years 11 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
87
Voted
JOCN
2010
74views more  JOCN 2010»
14 years 11 months ago
Developmental Specialization in the Right Intraparietal Sulcus for the Abstract Representation of Numerical Magnitude
or the Abstract Representation of Numerical Magnitude Ian D. Holloway1,2 and Daniel Ansari1,2 use number is an abstract quality of a set, the way in which a number is externally r...
Ian D. Holloway, Daniel Ansari
PAMI
2010
417views more  PAMI 2010»
14 years 11 months ago
Auto-Context and Its Application to High-Level Vision Tasks and 3D Brain Image Segmentation
The notion of using context information for solving high-level vision and medical image segmentation problems has been increasingly realized in the field. However, how to learn a...
Zhuowen Tu, Xiang Bai
ACL
2010
14 years 10 months ago
Efficient Inference through Cascades of Weighted Tree Transducers
Weighted tree transducers have been proposed as useful formal models for representing syntactic natural language processing applications, but there has been little description of ...
Jonathan May, Kevin Knight, Heiko Vogler
106
Voted
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 10 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
« Prev « First page 1915 / 2164 Last » Next »