Sciweavers

218 search results - page 23 / 44
» Composite Binary Losses
Sort
View
GISCIENCE
2008
Springer
130views GIS» more  GISCIENCE 2008»
15 years 26 days ago
Single-Holed Regions: Their Relations and Inferences
The discontinuities in boundaries and exteriors that regions with holes expose offer opportunities for inferences that are impossible for regions without holes. A systematic study ...
Maria Vasardani, Max J. Egenhofer
CORR
2008
Springer
106views Education» more  CORR 2008»
14 years 12 months ago
Mapping Semantic Networks to Undirected Networks
Abstract--There exists an injective, information-preserving function that maps a semantic network (i.e a directed labeled network) to a directed network (i.e. a directed unlabeled ...
Marko A. Rodriguez
ICISC
2009
146views Cryptology» more  ICISC 2009»
14 years 9 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
ADMA
2008
Springer
152views Data Mining» more  ADMA 2008»
15 years 6 months ago
MPSQAR: Mining Quantitative Association Rules Preserving Semantics
To avoid the loss of semantic information due to the partition of quantitative values, this paper proposes a novel algorithm, called MPSQAR, to handle the quantitative association ...
Chunqiu Zeng, Jie Zuo, Chuan Li, Kaikuo Xu, Shengq...
CODES
2005
IEEE
15 years 5 months ago
Enhanced code density of embedded CISC processors with echo technology
Code density is an important issue in memory constrained systems. Some RISC processor, e.g. the THUMB extension in the ARM processor, supports aggressive code size reduction even ...
Youfeng Wu, Mauricio Breternitz Jr., Herbert H. J....