Sciweavers

661 search results - page 22 / 133
» Combining Information using Hard Constraints
Sort
View
111
Voted
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 1 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
CP
2003
Springer
15 years 5 months ago
Propagating N-Ary Rigid-Body Constraints
In this paper, we present an algorithm to propagate an n-ary constraint (with n greater than 2) specifying the relative positions of points in a three-dimensional rigid group. The ...
Ludwig Krippahl, Pedro Barahona
SIGIR
2010
ACM
15 years 4 months ago
Estimation of statistical translation models based on mutual information for ad hoc information retrieval
As a principled approach to capturing semantic relations of words in information retrieval, statistical translation models have been shown to outperform simple document language m...
Maryam Karimzadehgan, ChengXiang Zhai
126
Voted
AIPRF
2008
15 years 1 months ago
Internal vs. External Parameters in Fitness Functions
A fitness function is needed for a Genetic Algorithm (GA) to work, and it appears natural that the combination of objectives and constraints into a single scalar function using ar...
Pedro A. Diaz-Gomez, Dean F. Hougen
SAC
2010
ACM
15 years 19 days ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit