Sciweavers

26354 search results - page 5116 / 5271
» How we refactor, and how we know it
Sort
View
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 3 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
LREC
2008
159views Education» more  LREC 2008»
15 years 3 months ago
Evaluation of Context-Dependent Phrasal Translation Lexicons for Statistical Machine Translation
We present new direct data analysis showing that dynamically-built context-dependent phrasal translation lexicons are more useful resources for phrase-based statistical machine tr...
Marine Carpuat, Dekai Wu
110
Voted
MKWI
2008
156views Business» more  MKWI 2008»
15 years 3 months ago
Enabling Open Innovation in a World of Ubiquitous Computing - Proposing a Research Agenda
: This article proposes a new Ubiquitous Computing (UC) infrastructure for open access to object data that will come along with a new research agenda especially for the field of Wi...
Detlef Schoder, Christian Schmitt, Kai Fischbach, ...
IQ
2007
15 years 3 months ago
Rule-Based Measurement Of Data Quality In Nominal Data
: Sufficiently high data quality is crucial for almost every application. Nonetheless, data quality issues are nearly omnipresent. The reasons for poor quality cannot simply be bla...
Jochen Hipp, Markus Müller, Johannes Hohendor...
SEDE
2008
15 years 3 months ago
Improving Fuzzy Algorithms for Automatic Magnetic Resonance Image Segmentation
: In this paper, we present reliable algorithms for fuzzy k-means and C-means that could improve MRI segmentation. Since the k-means or FCM method aims to minimize the sum of squar...
Ennumeri A. Zanaty, Sultan Aljahdali, Narayan C. D...
« Prev « First page 5116 / 5271 Last » Next »