Sciweavers

3987 search results - page 739 / 798
» Ontology-Based Model Transformation
Sort
View
JOC
2000
95views more  JOC 2000»
14 years 9 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
TNN
1998
125views more  TNN 1998»
14 years 9 months ago
Symbolic connectionism in natural language disambiguation
Abstract—Natural language understanding involves the simultaneous consideration of a large number of different sources of information. Traditional methods employed in language an...
Samuel W. K. Chan, James Franklin
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
14 years 7 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...
GI
2005
Springer
15 years 3 months ago
SPI-Workbench - Modellierung, Analyse und Optimierung eingebetteter Systeme
: Das SPI-Modell dient zur Repr¨asentation von heterogenen eingebetteten Systemen. Basierend auf diesem Modell wurde in einem Forschungsverbund zwischen der TU Braunschweig, der U...
Christian Haubelt, Marek Jersak, Kai Richter, Kars...
CVPR
2009
IEEE
16 years 5 months ago
Automated Extraction of Signs from Continuous Sign Language Sentences using Iterated Conditional Modes
Recognition of signs in sentences requires a training set constructed out of signs found in continuous sentences. Currently, this is done manually, which is a tedious process. I...
Barbara L. Loeding, Sudeep Sarkar, Sunita Nayak