Sciweavers

4526 search results - page 756 / 906
» Algorithmic problems related to the Internet
Sort
View
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 9 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal
STOC
2003
ACM
188views Algorithms» more  STOC 2003»
14 years 9 months ago
Almost random graphs with simple hash functions
We describe a simple randomized construction for generating pairs of hash functions h1, h2 from a universe U to ranges V = [m] = {0, 1, . . . , m - 1} and W = [m] so that for ever...
Martin Dietzfelbinger, Philipp Woelfel
VLDB
2007
ACM
93views Database» more  VLDB 2007»
14 years 3 months ago
Seeking Stable Clusters in the Blogosphere
The popularity of blogs has been increasing dramatically over the last couple of years. As topics evolve in the blogosphere, keywords align together and form the heart of various ...
Nilesh Bansal, Fei Chiang, Nick Koudas, Frank Wm. ...
PODC
2006
ACM
14 years 2 months ago
Self-stabilizing byzantine agreement
Byzantine agreement algorithms typically assume implicit initial state consistency and synchronization among the correct nodes and then operate in coordinated rounds of informatio...
Ariel Daliot, Danny Dolev
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
14 years 20 days ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...