Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,209,404 papers from all fields of science
Search
Sign In
Create Free Account
Private Case
Known as:
Private Case (Library Collection)
The Private Case of the British Library is a collection of pornographic books and other items, not normally available to general readers. The…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A Road Pricing Model for Congested Highways Based on Link Densities
L. Grange
,
Rodrigo Troncoso
,
Felipe González
2017
Corpus ID: 54790761
A road pricing model is presented that determines tolls for congested highways. The main contribution of this paper is to include…
Expand
2017
2017
Quasi-likelihood detection of rectangle ultra-wideband quasi-radiosignal with adaptation in duration
A. P. Trifonov
,
Y. Korchagin
,
K. Titov
Dynamics of Systems, Mechanisms and Machines…
2017
Corpus ID: 5704022
The quasi-likelihood algorithm detection of rectangle ultra-wideband quasi-radiosignal with unknown amplitude, initial phase and…
Expand
2017
2017
Quasi-likelihood detection of rectangle ultra-wideband quasi-radiosignal
A. P. Trifonov
,
Y. Korchagin
,
K. Titov
International Siberian Conference on Control and…
2017
Corpus ID: 36850978
The quasi-likelihood algorithm detection of rectangle ultra-wideband quasi-radiosignal with unknown amplitude, initial phase and…
Expand
2014
2014
Using semantically connected parse trees to answer multi-sentence queries
D. Ilvovsky
Automatic Documentation and Mathematical…
2014
Corpus ID: 255422173
This paper considers the problem of finding relevant answers to multi-sentence questions, which is urgent for many applied fields…
Expand
2012
2012
k Nearest Neighbor Using Ensemble Clustering
Loai AbedAllah
,
I. Shimshoni
International Conference on Data Warehousing and…
2012
Corpus ID: 6779156
The performance of the k Nearest Neighbor (kNN) algorithm depends critically on its being given a good metric over the input…
Expand
2012
2012
Private and blind digital fingerprinting schemes based upon complete complementary codes
T. Kojima
,
Naoki Ohtani
International Symposium on Information Theory and…
2012
Corpus ID: 15293778
Complete complementary code is a family of the spread spectrum sequences with good correlation properties. In this study, the…
Expand
2009
2009
Local Routing in Multihop Networks
D. Batovski
2009
Corpus ID: 59836938
The overlapping of multihop paths in decentralized networks may cause congestion at certain nodes and underutilization of other…
Expand
2009
2009
kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity
S. Kisilevich
,
Y. Elovici
,
Bracha Shapira
,
L. Rokach
Interdisciplinary Studies in Information Privacy…
2009
Corpus ID: 7245122
k-anonymity is the method used for masking sensitive data which successfully solves the problem of re-linking of data with an…
Expand
2008
2008
An information perspective on evolutionary computation
Yossi Borenstein
Annual Conference on Genetic and Evolutionary…
2008
Corpus ID: 52296520
2003
2003
1 UNIFIED THEORY OF BIVACUUM , CORPUSCLE-WAVE DUALITY , FIELDS AND TIME
A. Kaivarainen
2003
Corpus ID: 161052940
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE