Sciweavers

661 search results - page 22 / 133
» Combining Information using Hard Constraints
Sort
View
DBSEC
2009
110views Database» more  DBSEC 2009»
14 years 11 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
CP
2003
Springer
15 years 3 months ago
Propagating N-Ary Rigid-Body Constraints
In this paper, we present an algorithm to propagate an n-ary constraint (with n greater than 2) specifying the relative positions of points in a three-dimensional rigid group. The ...
Ludwig Krippahl, Pedro Barahona
SIGIR
2010
ACM
15 years 2 months ago
Estimation of statistical translation models based on mutual information for ad hoc information retrieval
As a principled approach to capturing semantic relations of words in information retrieval, statistical translation models have been shown to outperform simple document language m...
Maryam Karimzadehgan, ChengXiang Zhai
AIPRF
2008
14 years 11 months ago
Internal vs. External Parameters in Fitness Functions
A fitness function is needed for a Genetic Algorithm (GA) to work, and it appears natural that the combination of objectives and constraints into a single scalar function using ar...
Pedro A. Diaz-Gomez, Dean F. Hougen
86
Voted
SAC
2010
ACM
14 years 10 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit