Sciweavers

741 search results - page 108 / 149
» A Note on the Use of Independent Sets for the k-SAT Problem
Sort
View
ASIACRYPT
2004
Springer
14 years 2 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
HPDC
2002
IEEE
14 years 1 months ago
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. So...
Kavitha Ranganathan, Ian T. Foster
MCS
2010
Springer
13 years 10 months ago
Tomographic Considerations in Ensemble Bias/Variance Decomposition
Abstract. Classifier decision fusion has been shown to act in a manner analogous to the back-projection of Radon transformations when individual classifier feature sets are non o...
David Windridge
AMC
2005
128views more  AMC 2005»
13 years 8 months ago
A new face recognition method based on SVD perturbation for single example image per person
At present, there are many methods for frontal view face recognition. However, few of them can work well when only one example image per class is available. In this paper, we pres...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou
CNSM
2010
13 years 6 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood