Sciweavers

5344 search results - page 150 / 1069
» Privacy-Preserving Set Operations
Sort
View
VLDB
1991
ACM
165views Database» more  VLDB 1991»
15 years 6 months ago
Aggregation and Relevance in Deductive Databases
In this paper we present a technique to optimize queries on deductive databases that use aggregate operations such as min, max, and “largest Ic values.” Our approach is based ...
S. Sudarshan, Raghu Ramakrishnan
DCC
2010
IEEE
15 years 3 months ago
Anonymity in shared symmetric key primitives
We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this level of anonymity. A new schem...
Gregory M. Zaverucha, Douglas R. Stinson
ENTCS
2010
114views more  ENTCS 2010»
15 years 3 months ago
On Rule Formats for Zero and Unit Elements
This paper proposes a rule format for Structural Operational Semantics guaranteeing that certain constants act as left or right zero elements for a set of binary operators. Our de...
Luca Aceto, Matteo Cimini, Anna Ingólfsd&oa...
JMLR
2008
95views more  JMLR 2008»
15 years 3 months ago
Learning Similarity with Operator-valued Large-margin Classifiers
A method is introduced to learn and represent similarity with linear operators in kernel induced Hilbert spaces. Transferring error bounds for vector valued large-margin classifie...
Andreas Maurer
121
Voted
AI
2002
Springer
15 years 3 months ago
Explanations, belief revision and defeasible reasoning
We present different constructions for non-prioritized belief revision, that is, belief changes in which the input sentences are not always accepted. First, we present the concept...
Marcelo A. Falappa, Gabriele Kern-Isberner, Guille...