Sciweavers

1099 search results - page 92 / 220
» String Transformation Learning
Sort
View
IACR
2011
196views more  IACR 2011»
14 years 14 days ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
90
Voted
WWW
2003
ACM
16 years 1 months ago
A Presentation Architecture for Individualized Content
A modern approach for generating individualized web-sites is to compose a page out of individual elements, for instance XML-fragments, which is eventually transformed to . If the ...
Alberto González Palomo, Carsten Ullrich, P...
ICIP
2006
IEEE
16 years 2 months ago
A New Method for Boundary-Based Shape Matching and Retrieval
This paper presents a novel method for efficient boundary based shapes matching and retrieval in presence of occlusion. In this method, the geometric and topological information o...
Minh-Son Dao, Raffaele de Amicis
88
Voted
FOSSACS
2009
Springer
15 years 7 months ago
Parameter Reduction in Grammar-Compressed Trees
Abstract. Trees can be conveniently compressed with linear straight-line contextfree tree grammars. Such grammars generalize straight-line context-free string grammars which are wi...
Markus Lohrey, Sebastian Maneth, Manfred Schmidt-S...
110
Voted
SLE
2009
Springer
15 years 7 months ago
Language Boxes
As domain-specific modeling begins to attract widespread acceptance, pressure is increasing for the development of new domainspecific languages. Unfortunately these DSLs typicall...
Lukas Renggli, Marcus Denker, Oscar Nierstrasz