Sciweavers

3954 search results - page 464 / 791
» Image-based Model Completion
Sort
View
KAIS
2008
99views more  KAIS 2008»
15 years 4 months ago
Privacy-preserving SVM classification
Classical data mining algorithms implicitly assume complete access to all data, either in centralized or federated form. However, privacy and security concerns often prevent sharin...
Jaideep Vaidya, Hwanjo Yu, Xiaoqian Jiang
JPDC
2006
105views more  JPDC 2006»
15 years 4 months ago
Mutual anonymous overlay multicast
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei...
ENTCS
2007
97views more  ENTCS 2007»
15 years 4 months ago
Process Algebra Having Inherent Choice: Revised Semantics for Concurrent Systems
Process algebras are standard formalisms for compositionally describing systems by the dependencies of their observable synchronous communication. In concurrent systems, parallel ...
Harald Fecher, Heiko Schmidt
MMS
2008
15 years 4 months ago
A framework for efficient and rapid development of cross-platform audio applications
CLAM is a C++ framework that offers a complete development and research platform for the audio and music domain. om offering an abstract model for audio systems, it also includes ...
Xavier Amatriain, Pau Arumi, David Garcia
MSCS
2008
97views more  MSCS 2008»
15 years 4 months ago
Logical relations for monadic types
Abstract. Software security can be ensured by specifying and verifying security properties of software using formal methods with strong theoretical bases. In particular, programs c...
Jean Goubault-Larrecq, Slawomir Lasota, David Nowa...