Sciweavers

26 search results - page 2 / 6
» Studying Maximum Information Leakage Using Karush-Kuhn-Tucke...
Sort
View
PODS
2008
ACM
155views Database» more  PODS 2008»
15 years 10 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...
ICML
2005
IEEE
15 years 10 months ago
Discriminative versus generative parameter and structure learning of Bayesian network classifiers
In this paper, we compare both discriminative and generative parameter learning on both discriminatively and generatively structured Bayesian network classifiers. We use either ma...
Franz Pernkopf, Jeff A. Bilmes
IJCNLP
2005
Springer
15 years 3 months ago
Two-Phase Biomedical Named Entity Recognition Using A Hybrid Method
Biomedical named entity recognition (NER) is a difficult problem in biomedical information processing due to the widespread ambiguity of terms out of context and extensive lexical ...
Seonho Kim, Juntae Yoon, Kyung-Mi Park, Hae-Chang ...
ICDCS
2011
IEEE
13 years 9 months ago
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
—In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. While those data may contain sensitive personal information...
Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
WSC
2001
14 years 11 months ago
The use of simulation for process improvement at an ambulatory surgery center
This work has for objective building a simulation model to evaluate different alternatives of operation of a projected center for ambulatory surgery. For the construction of the m...
Francisco J. Ramis, Jorge L. Palma, Felipe F. Baes...