Sciweavers

5344 search results - page 935 / 1069
» Privacy-Preserving Set Operations
Sort
View
KES
2008
Springer
15 years 3 months ago
Classification and Retrieval through Semantic Kernels
Abstract. This work proposes a family of language-independent semantic kernel functions defined for individuals in an ontology. This allows exploiting wellfounded kernel methods fo...
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
JMM2
2006
138views more  JMM2 2006»
15 years 3 months ago
A Framework for Constructing Real-time Immersive Environments for Training Physical Activities
Abstract-- This paper describes a framework for constructing a three-dimensional immersive environment that can be used for training physical activities. The system is designed to ...
Sang-Hack Jung, Ruzena Bajcsy
NC
2008
122views Neural Networks» more  NC 2008»
15 years 3 months ago
Computation with finite stochastic chemical reaction networks
A highly desired part of the synthetic biology toolbox is an embedded chemical microcontroller, capable of autonomously following a logic program specified by a set of instructions...
David Soloveichik, Matthew Cook, Erik Winfree, Jeh...
IJAR
2007
96views more  IJAR 2007»
15 years 3 months ago
Complexity measurement of fundamental pseudo-independent models
Pseudo-independent (PI) models are a special class of probabilistic domain model (PDM) where a set of marginally independent domain variables shows collective dependency, a specia...
J. Lee, Y. Xiang
123
Voted
SIGMETRICS
2008
ACM
135views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
In search of the elusive ground truth: the internet's as-level connectivity structure
Despite significant efforts to obtain an accurate picture of the Internet's actual connectivity structure at the level of individual autonomous systems (ASes), much has remai...
Ricardo V. Oliveira, Dan Pei, Walter Willinger, Be...