Sciweavers

24188 search results - page 324 / 4838
» Computing on Encrypted Data
Sort
View
DEXA
2004
Springer
161views Database» more  DEXA 2004»
15 years 9 months ago
Computing the Topological Relationship of Complex Regions
Topological predicates between spatial objects have always been a main area of research on spatial data handling, reasoning, and query languages. The focus of research has definit...
Markus Schneider
ICDM
2003
IEEE
126views Data Mining» more  ICDM 2003»
15 years 9 months ago
Interpretations of Association Rules by Granular Computing
This paper presents interpretations for association rules. It first introduces Pawlak’s method, and the corresponding algorithm of finding decision rules (a kind of association ...
Yuefeng Li, Ning Zhong
DATE
2002
IEEE
122views Hardware» more  DATE 2002»
15 years 9 months ago
Exploiting Idle Cycles for Algorithm Level Re-Computing
Although algorithm level re-computing techniques can trade-off the detection capability of Concurrent Error Detection (CED) vs. time overhead, it results in 100% time overhead whe...
Kaijie Wu, Ramesh Karri
BILDMED
2008
124views Algorithms» more  BILDMED 2008»
15 years 5 months ago
Non-equispaced Fourier Transform Vs. Polynomial-Based Metal Artifact Reduction in Computed Tomography
We propose a method, which treats metal artifact reduction in CT by sinogram restoration as a problem of scattered data interpolation. Corrupted sinogram entries are discarded and ...
Bärbel Kratz, Tobias Knopp, Jan Müller 0...
ACL
1992
15 years 5 months ago
Integrating Multiple Knowledge Sources for Detection and Correction of Repairs in Human-Computer Dialog
We have analyzed 607 sentences of spontaneous human-computer speech data containing repairs, drawn from a total corpus of 10,718 sentences. We present here criteria and techniques...
John Bear, John Dowding, Elizabeth Shriberg