Sciweavers

1532 search results - page 58 / 307
» Connection Relations in Mereotopology
Sort
View
FOCS
2010
IEEE
14 years 8 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
ICDAR
2011
IEEE
13 years 9 months ago
A Method of Evaluating Table Segmentation Results Based on a Table Image Ground Truther
—We propose a novel method to evaluate table segmentation results based on a table image ground truther. In the ground-truthing process, we first extract connected components fr...
Yanhui Liang, Yizhou Wang, Eric Saund
ICDAR
2011
IEEE
13 years 9 months ago
Graph Clustering-Based Ensemble Method for Handwritten Text Line Segmentation
—Handwritten text line segmentation on real-world data presents significant challenges that cannot be overcome by any single technique. Given the diversity of approaches and the...
Vasant Manohar, Shiv Naga Prasad Vitaladevuni, Hua...
PAM
2012
Springer
13 years 5 months ago
Re-wiring Activity of Malicious Networks
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily invo...
Maria Konte, Nick Feamster
DLOG
2001
14 years 11 months ago
A Note on Concepts and Distances
We combine the description logic ALC with the metric logics defined Entities that are conceived of as abstract points in the realm of ALC are given a spatial extension via an `ext...
Oliver Kutz, Frank Wolter, Michael Zakharyaschev