Sciweavers

1213 search results - page 62 / 243
» Approximation in quantale-enriched categories
Sort
View
FC
2005
Springer
97views Cryptology» more  FC 2005»
15 years 3 months ago
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Abstract. We propose a scheme for privacy-preserving escrow of financial transactions. The objective of the scheme is to preserve privacy and anonymity of the individual user enga...
Stanislaw Jarecki, Vitaly Shmatikov
TASLP
2008
136views more  TASLP 2008»
14 years 10 months ago
Distortion Estimation in Compressed Music Using Only Audio Fingerprints
Abstract--An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of an audio signal. It can be used for content-based audio identificat...
Peter Jan O. Doets, Reginald L. Lagendijk
RSEISP
2007
Springer
15 years 4 months ago
Checking Brain Expertise Using Rough Set Theory
Most information about the external world comes from our visual brain. However, it is not clear how this information is processed. We will analyze brain responses using machine lea...
Andrzej W. Przybyszewski
DAC
2007
ACM
15 years 11 months ago
An Effective Guidance Strategy for Abstraction-Guided Simulation
tive Guidance Strategy for Abstraction-Guided Simulation Flavio M. De Paula Alan J. Hu Department of Computer Science, University of British Columbia, {depaulfm, ajh}@cs.ubc.ca D...
Flavio M. de Paula, Alan J. Hu
KDD
2008
ACM
165views Data Mining» more  KDD 2008»
15 years 10 months ago
Colibri: fast mining of large static and dynamic graphs
Low-rank approximations of the adjacency matrix of a graph are essential in finding patterns (such as communities) and detecting anomalies. Additionally, it is desirable to track ...
Hanghang Tong, Spiros Papadimitriou, Jimeng Sun, P...