Sciweavers

834 search results - page 77 / 167
» Computing Minimal Models, Stable Models, and Answer Sets
Sort
View
SODA
2008
ACM
184views Algorithms» more  SODA 2008»
15 years 1 months ago
On the approximability of influence in social networks
In this paper, we study the spread of influence through a social network, in a model initially studied by Kempe, Kleinberg and Tardos [14, 15]: We are given a graph modeling a soc...
Ning Chen
SIGGRAPH
1996
ACM
15 years 4 months ago
Simulating Facial Surgery Using Finite Element Models
This paper describes a prototype system for surgical planning and prediction of human facial shape after craniofacial and maxillofacial surgery for patients with facial deformitie...
Rolf M. Koch, Markus H. Gross, Friedrich R. Carls,...
FCT
2009
Springer
15 years 6 months ago
Small-Space Analogues of Valiant's Classes
In the uniform circuit model of computation, the width of a boolean circuit exactly characterises the “space” complexity of the computed function. Looking for a similar relatio...
Meena Mahajan, B. V. Raghavendra Rao
ICCV
2009
IEEE
16 years 4 months ago
Detecting Interpretable and Accurate Scale-Invariant keypoints
This paper presents a novel method for detecting scale invariant keypoints. It fills a gap in the set of available methods, as it proposes a scale-selection mechanism for juncti...
Wolfgang F¨orstner, Timo Dickscheid, Falko Schind...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 3 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...