Sciweavers

10392 search results - page 2000 / 2079
» Introduction to Computer Science
Sort
View
ALT
2003
Springer
16 years 1 months ago
Learning a Subclass of Regular Patterns in Polynomial Time
An algorithm for learning a subclass of erasing regular pattern languages is presented. On extended regular pattern languages generated by patterns π of the form x0α1x1 . . . α...
John Case, Sanjay Jain, Rüdiger Reischuk, Fra...
276
Voted

Dataset
924views
16 years 3 hour ago
SCUT-COUCH2009 - A Comprehensive Online Unconstrained Handwriting Database
SCUT-COUCH 2009 database is a comprehensive database that consists of 12 datasets, namely GB1, GB2, TradGB1, Big5, Pinyin, Letters, Digit, Symbol, Word8888, Word17366, Word44208 an...
Lianwen Jin
WWW
2010
ACM
15 years 11 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
EDBTW
2010
Springer
15 years 11 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
ECBS
2009
IEEE
164views Hardware» more  ECBS 2009»
15 years 11 months ago
Semantically Enhanced Containers for Concurrent Real-Time Systems
Future space missions, such as Mars Science Laboratory, are built upon computing platforms providing a high degree of autonomy and diverse functionality. The increased sophisticat...
Damian Dechev, Peter Pirkelbauer, Nicolas Rouquett...
« Prev « First page 2000 / 2079 Last » Next »