Sciweavers

2981 search results - page 312 / 597
» Answer Set Planning
Sort
View
CDC
2010
IEEE
155views Control Systems» more  CDC 2010»
14 years 12 months ago
Relaxing LMI domination matricially
Given linear matrix inequalities (LMIs) L1 and L2 in the same number of variables it is natural to ask: (Q1) does one dominate the other, that is, does L1(X) 0 imply L2(X) 0? (Q2) ...
J. William Helton, Igor Klep, Scott A. McCullough
JUCS
2010
159views more  JUCS 2010»
14 years 11 months ago
Authoring of Probabilistic Sequencing in Adaptive Hypermedia with Bayesian Networks
Abstract: One of the difficulties that self-directed learners face on their learning process is choosing the right learning resources. One of the goals of adaptive educational syst...
Sergio Gutiérrez Santos, Jaime Mayor-Berzal...
ICDT
2011
ACM
213views Database» more  ICDT 2011»
14 years 8 months ago
On provenance and privacy
Provenance in scientific workflows is a double-edged sword. On the one hand, recording information about the module executions used to produce a data item, as well as the parame...
Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Ju...
ASIACRYPT
2011
Springer
14 years 4 months ago
Noiseless Database Privacy
Differential Privacy (DP) has emerged as a formal, flexible framework for privacy protection, with a guarantee that is agnostic to auxiliary information and that admits simple ru...
Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Sr...
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
16 years 6 months ago
Source-aware Entity Matching: A Compositional Approach
Entity matching (a.k.a. record linkage) plays a crucial role in integrating multiple data sources, and numerous matching solutions have been developed. However, the solutions have...
Warren Shen, Pedro DeRose, Long Vu, AnHai Doan, Ra...