Sciweavers

2272 search results - page 213 / 455
» Provable Data Privacy
Sort
View
102
Voted
ECOOP
1997
Springer
15 years 5 months ago
Subtyping Is Not a Good "Match" for Object-Oriented Languages
We present the design and rationale of a new statically-typed object-oriented language, LOOM. LOOM retains most of the features of the earlier language PolyTOIL. However the subtyp...
Kim B. Bruce, Leaf Petersen, Adrian Fiech
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
ECML
2006
Springer
15 years 2 months ago
Efficient Large Scale Linear Programming Support Vector Machines
This paper presents a decomposition method for efficiently constructing 1-norm Support Vector Machines (SVMs). The decomposition algorithm introduced in this paper possesses many d...
Suvrit Sra
83
Voted
ALENEX
2007
130views Algorithms» more  ALENEX 2007»
15 years 2 months ago
Locating Guards for Visibility Coverage of Polygons
We propose heuristics for visibility coverage of a polygon with the fewest point guards. This optimal coverage problem, often called the “art gallery problem”, is known to be ...
Yoav Amit, Joseph S. B. Mitchell, Eli Packer
AAAI
2004
15 years 2 months ago
PRECISE on ATIS: Semantic Tractability and Experimental Results
The need for Natural Language Interfaces to databases (NLIs) has become increasingly acute as more and more people access information through their web browsers, PDAs, and cell ph...
Ana-Maria Popescu, Alex Armanasu, Oren Etzioni, Da...