Sciweavers

1024 search results - page 78 / 205
» Value complete, column complete, predicate complete
Sort
View
DKE
2008
98views more  DKE 2008»
15 years 1 months ago
Privacy-preserving imputation of missing data
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data ...
Geetha Jagannathan, Rebecca N. Wright
ENTCS
2006
103views more  ENTCS 2006»
15 years 1 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström
MCSS
2006
Springer
15 years 1 months ago
Optimal input sets for time minimality in quantized control systems
Abstract Limited capacity of communication channels has brought to the attention of many researchers the analysis of control systems subject to a quantized input set. In some funda...
Alessia Marigo
INFORMATICALT
2007
75views more  INFORMATICALT 2007»
15 years 1 months ago
An Effective Method for Initialization of Lloyd-Max's Algorithm of Optimal Scalar Quantization for Laplacian Source
Abstract. In this paper an exact and complete analysis of the Lloyd–Max’s algorithm and its initialization is carried out. An effective method for initialization of Lloyd–Max...
Zoran Peric, Jelena Nikolic
CGF
2000
102views more  CGF 2000»
15 years 1 months ago
Tone Reproduction for Interactive Walkthroughs
When a rendering algorithm has created a pixel array of radiance values the task of producing an image is not yet completed. In fact, to visualize the result the radiance values s...
Annette Scheel, Marc Stamminger, Hans-Peter Seidel