Sciweavers

4013 search results - page 258 / 803
» computer 2002
Sort
View
137
Voted
SIGKDD
2002
90views more  SIGKDD 2002»
15 years 4 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
COMPUTER
2002
115views more  COMPUTER 2002»
15 years 4 months ago
PKI: It's Not Dead, Just Resting
Despite enthusiastic predictions in the trade press, an X.509-style PKI has so far failed to eventuate to any significant degree. This paper looks at some of the reasons behind th...
Peter Gutmann
118
Voted
COMPUTING
2002
93views more  COMPUTING 2002»
15 years 4 months ago
Non-Nested Multi-Level Solvers for Finite Element Discretisations of Mixed Problems
We consider a general framework for analysing the convergence of multi-grid solvers applied to finite element discretisations of mixed problems, both of conforming and nonconformi...
V. John, P. Knobloch, Gunar Matthies, Lutz Tobiska
126
Voted
FSS
2002
125views more  FSS 2002»
15 years 4 months ago
An "orderwise" polynomial regression procedure for fuzzy data
In this work we study approximation of fuzzy functions on a finite set of distinct points. Two types of approximation are considered, one method based on fuzzy linear programming p...
Pierpaolo D'Urso, Tommaso Gastaldi
NGC
2002
Springer
111views Communications» more  NGC 2002»
15 years 4 months ago
The Power of Communication: P Systems with Symport/Antiport
In the attempt to have a framework where the computation is done by communication only, we consider the biological phenomenon of trans-membrane transport of couples of chemicals (o...
Andrei Paun, Gheorghe Paun