Sciweavers

551 search results - page 103 / 111
» Preventing existence
Sort
View
ACL
1994
14 years 10 months ago
An Automatic Treebank Conversion Algorithm for Corpus Sharing
An automatic treebank conversion method is proposed in this paper to convert a treebank into another treebank. A new treebank associated with a different grammar can be generated ...
Jong-Nae Wang, Jing-Shin Chang, Keh-Yih Su
ATAL
2010
Springer
14 years 10 months ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...
MM
2010
ACM
148views Multimedia» more  MM 2010»
14 years 9 months ago
RAPID: a reliable protocol for improving delay
Recently, there has been a dramatic increase in interactive cloud based software applications (e.g. working on remote machines, online games, interactive websites such as financia...
Sanjeev Mehrotra, Jin Li, Cheng Huang
101
Voted
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
14 years 9 months ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
BMCBI
2010
147views more  BMCBI 2010»
14 years 9 months ago
Indirect two-sided relative ranking: a robust similarity measure for gene expression data
Background: There is a large amount of gene expression data that exists in the public domain. This data has been generated under a variety of experimental conditions. Unfortunatel...
Louis Licamele, Lise Getoor