Sciweavers

2421 search results - page 234 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
146
Voted
BMCBI
2007
146views more  BMCBI 2007»
15 years 4 months ago
Towards Semantic e-Science for Traditional Chinese Medicine
Background: Recent advances in Web and information technologies with the increasing decentralization of organizational structures have resulted in massive amounts of information r...
Huajun Chen, Yuxin Mao, Xiaoqing Zheng, Meng Cui, ...
128
Voted
KI
2007
Springer
15 years 10 months ago
Proposal of Generalized Rule Programming Model
Abstract. Rule-based programming paradigm is omnipresent in number of engineering domains. However, there are some fundamental semantical differences between it, and classic progr...
Grzegorz J. Nalepa, Igor Wojnicki
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
16 years 5 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
124
Voted
VAMOS
2007
Springer
15 years 10 months ago
Variability Models Must Not be Invariant!
Variability modeling techniques are used to specify variable aspects of members of a family of related software artifacts. Instances of variability models are then used to effici...
Elmar Jürgens, Markus Pizka
ICRA
2010
IEEE
95views Robotics» more  ICRA 2010»
15 years 3 months ago
Optimizing coordinate choice for locomoting systems
Abstract— Gait evaluation techniques that use Stokes’s theorem to integrate a system’s equations of motion have traditionally been limited to finding only the net rotations ...
Ross L. Hatton, Howie Choset