Sciweavers

5344 search results - page 244 / 1069
» Privacy-Preserving Set Operations
Sort
View
135
Voted
ICALP
2004
Springer
15 years 9 months ago
Learning a Hidden Subgraph
We consider the problem of learning a labeled graph from a given family of graphs on n vertices in a model where the only allowed operation is to query whether a set of vertices i...
Noga Alon, Vera Asodi
106
Voted
ICDAR
2003
IEEE
15 years 9 months ago
Non-similar candidate removal method for off-line handwritten Korean character recognition
We describe an off-line handwritten Korean character recognition module for real-time address reading. Our module has a two-stage recognition structure. The first recognition aims...
Seon-Hwa Jeong, Yun Seok Nam, Hye-Kyu Kim
DATE
2002
IEEE
94views Hardware» more  DATE 2002»
15 years 8 months ago
Exact Grading of Multiple Path Delay Faults
The problem of fault grading for multiple path delay faults is studied and a method of obtaining the exact coverage is presented. The faults covered are represented and manipulate...
Saravanan Padmanaban, Spyros Tragoudas
RTCSA
1999
IEEE
15 years 8 months ago
Non-Blocking Data Sharing in Multiprocessor Real-Time Systems
A non-blocking protocol that allows real-time tasks to share data in a multiprocessor system is presented in this paper. The protocol gives the means to concurrent real-time tasks...
Philippas Tsigas, Yi Zhang
ECAI
1994
Springer
15 years 8 months ago
Constraint Satisfaction for Multiple Capacitated Job Shop Scheduling
We introduce the multiple capacitated job shop scheduling problem as a generalization of the job shop scheduling problem. In this problem machines may process several operations s...
W. P. M. Nuijten, Emile H. L. Aarts