Sciweavers

10392 search results - page 2000 / 2079
» Introduction to Computer Science
Sort
View
86
Voted
ALT
2003
Springer
15 years 9 months ago
Learning a Subclass of Regular Patterns in Polynomial Time
An algorithm for learning a subclass of erasing regular pattern languages is presented. On extended regular pattern languages generated by patterns π of the form x0α1x1 . . . α...
John Case, Sanjay Jain, Rüdiger Reischuk, Fra...
208
Voted

Dataset
924views
15 years 8 months ago
SCUT-COUCH2009 - A Comprehensive Online Unconstrained Handwriting Database
SCUT-COUCH 2009 database is a comprehensive database that consists of 12 datasets, namely GB1, GB2, TradGB1, Big5, Pinyin, Letters, Digit, Symbol, Word8888, Word17366, Word44208 an...
Lianwen Jin
WWW
2010
ACM
15 years 7 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
90
Voted
EDBTW
2010
Springer
15 years 7 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
113
Voted
ECBS
2009
IEEE
164views Hardware» more  ECBS 2009»
15 years 7 months ago
Semantically Enhanced Containers for Concurrent Real-Time Systems
Future space missions, such as Mars Science Laboratory, are built upon computing platforms providing a high degree of autonomy and diverse functionality. The increased sophisticat...
Damian Dechev, Peter Pirkelbauer, Nicolas Rouquett...
« Prev « First page 2000 / 2079 Last » Next »