Sciweavers

3134 search results - page 363 / 627
» Computing full disjunctions
Sort
View
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
15 years 2 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
DIMEA
2008
190views Multimedia» more  DIMEA 2008»
15 years 2 months ago
Bridging the gap between the digital and the physical: design and evaluation of a mobile augmented reality guide for the museum
Can Augmented Reality (AR) techniques inform the design and implementation of a mobile multimedia guide for the museum setting? Drawing from our experience both on previous mobile...
Areti Damala, Pierre Cubaud, Anne Bationo, Pascal ...
ECAI
2008
Springer
15 years 2 months ago
Approximate structure preserving semantic matching
Abstract. Typical ontology matching applications, such as ontology integration, focus on the computation of correspondences holding between the nodes of two graph-like structures, ...
Fausto Giunchiglia, Mikalai Yatskevich, Fiona McNe...
ECAI
2008
Springer
15 years 2 months ago
Structure Learning of Markov Logic Networks through Iterated Local Search
Many real-world applications of AI require both probability and first-order logic to deal with uncertainty and structural complexity. Logical AI has focused mainly on handling com...
Marenglen Biba, Stefano Ferilli, Floriana Esposito
112
Voted
ICWS
2010
IEEE
15 years 2 months ago
Highly Scalable Web Service Composition Using Binary Tree-Based Parallelization
Data intensive applications, e.g. in life sciences, pose new efficiency challenges to the service composition problem. Since today computing power is mainly increased by multiplica...
Patrick Hennig, Wolf-Tilo Balke