Sciweavers

5344 search results - page 404 / 1069
» Privacy-Preserving Set Operations
Sort
View
DLT
2009
15 years 2 months ago
Closures in Formal Languages and Kuratowski's Theorem
A famous theorem of Kuratowski states that, in a topological space, at most 14 distinct sets can be produced by repeatedly applying the operations of closure and complement to a gi...
Janusz A. Brzozowski, Elyot Grant, Jeffrey Shallit
GRAPHICSINTERFACE
2009
15 years 2 months ago
QuickSelect: history-based selection expansion
When editing a graphical document, it is common to apply a change to multiple items at once, and a variety of tools exist for selecting sets of items. However, directly selecting ...
Sara L. Su, Sylvain Paris, Frédo Durand
183
Voted
ISF
2010
164views more  ISF 2010»
15 years 2 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
168
Voted
CORR
2011
Springer
151views Education» more  CORR 2011»
14 years 8 months ago
A New Representation Theorem for Many-valued Modal Logics
We propose a new definition of the representation theorem for many-valued logics, with modal operators as well, and define the stronger relationship between algebraic models of ...
Zoran Majkic
PRL
2011
14 years 7 months ago
A Bayes-true data generator for evaluation of supervised and unsupervised learning methods
Benchmarking pattern recognition, machine learning and data mining methods commonly relies on real-world data sets. However, there are some disadvantages in using real-world data....
Janick V. Frasch, Aleksander Lodwich, Faisal Shafa...