Sciweavers

5344 search results - page 353 / 1069
» Privacy-Preserving Set Operations
Sort
View
CORR
2008
Springer
85views Education» more  CORR 2008»
15 years 4 months ago
Ranking and Unranking of Hereditarily Finite Functions and Permutations
Prolog's ability to return multiple answers on backtracking provides an elegant mechanism to derive reversible encodings of combinatorial objects as Natural Numbers i.e. ranki...
Paul Tarau
AMC
2006
75views more  AMC 2006»
15 years 4 months ago
Common stabilizers for linear control systems in the presence of actuators outage
This paper presents common stabilizers for linear control systems when actuators happen to fail. The possible outage of actuators examined in this study are not confined to a pre-s...
Yew-Wen Liang, Der-Cherng Liaw
FUIN
2006
88views more  FUIN 2006»
15 years 4 months ago
Calculi of Approximation Spaces
This paper considers the problem of how to establish calculi of approximation spaces. Approximation spaces considered in the context of rough sets were introduced by Zdzislaw Pawla...
Andrzej Skowron, Jaroslaw Stepaniuk, James F. Pete...
CN
2007
124views more  CN 2007»
15 years 4 months ago
Cryptographic techniques for mobile ad-hoc networks
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New ...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
ISI
2008
Springer
15 years 4 months ago
Visual Analytics for Supporting Entity Relationship Discovery on Text Data
To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant ...
Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, HweeHwa...