Sciweavers

102 search results - page 12 / 21
» An Improved Pseudo-random Generator Based on Discrete Log
Sort
View
SIGIR
2010
ACM
13 years 7 months ago
Learning to rank query reformulations
Query reformulation techniques based on query logs have recently proven to be effective for web queries. However, when initial queries have reasonably good quality, these techniqu...
Van Dang, Michael Bendersky, W. Bruce Croft
ADC
2005
Springer
183views Database» more  ADC 2005»
14 years 28 days ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
NDSS
2003
IEEE
14 years 20 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
BMCBI
2008
128views more  BMCBI 2008»
13 years 7 months ago
Improving the prediction accuracy in classification using the combined data sets by ranks of gene expressions
Background: The information from different data sets experimented under different conditions may be inconsistent even though they are performed with the same research objectives. ...
Ki-Yeol Kim, Dong Hyuk Ki, Hei-Cheul Jeung, Hyun C...
FOCS
1997
IEEE
13 years 11 months ago
Beyond the Flow Decomposition Barrier
We introduce a new approach to the maximum flow problem. This approach is based on assigning arc lengths based on the residual flow value and the residual arc capacities. Our appro...
Andrew V. Goldberg, Satish Rao