Sciweavers

1575 search results - page 177 / 315
» The provenance of electronic data
Sort
View
CCS
2010
ACM
14 years 9 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
JMLR
2010
162views more  JMLR 2010»
14 years 6 months ago
A Surrogate Modeling and Adaptive Sampling Toolbox for Computer Based Design
An exceedingly large number of scientific and engineering fields are confronted with the need for computer simulations to study complex, real world phenomena or solve challenging ...
Dirk Gorissen, Ivo Couckuyt, Piet Demeester, Tom D...
IBPRIA
2011
Springer
14 years 3 months ago
Classifying Melodies Using Tree Grammars
Abstract. Similarity computation is a difficult issue in music information retrieval, because it tries to emulate the special ability that humans show for pattern recognition in ge...
José Francisco Bernabeu, Jorge Calera-Rubio...
PAKDD
2011
ACM
253views Data Mining» more  PAKDD 2011»
14 years 2 months ago
Balance Support Vector Machines Locally Using the Structural Similarity Kernel
A structural similarity kernel is presented in this paper for SVM learning, especially for learning with imbalanced datasets. Kernels in SVM are usually pairwise, comparing the sim...
Jianxin Wu
HCI
2009
14 years 9 months ago
Acquiring a Physical World and Serving Its Mirror World Simultaneously
A mirror world, which is a virtual space modeling a physical space, attracts enormous interests from VR community recently. Various applications such as Second Life, Google Earth a...
Sengpyo Hong, Jong-gil Ahn, Heedong Ko, Jinwook Ki...