Sciweavers

2061 search results - page 391 / 413
» Authorization for Metacomputing Applications
Sort
View
129
Voted
KDD
2010
ACM
250views Data Mining» more  KDD 2010»
15 years 5 months ago
On community outliers and their efficient detection in information networks
Linked or networked data are ubiquitous in many applications. Examples include web data or hypertext documents connected via hyperlinks, social networks or user profiles connected...
Jing Gao, Feng Liang, Wei Fan, Chi Wang, Yizhou Su...
137
Voted
ELPUB
2008
ACM
15 years 5 months ago
A review of journal policies for sharing research data
Background: Sharing data is a tenet of science, yet commonplace in only a few subdisciplines. Recognizing that a data sharing culture is unlikely to be achieved without policy gui...
Heather A. Piwowar, Wendy Webber Chapman
155
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
133
Voted
EUROISI
2008
15 years 5 months ago
Buzz Monitoring in Word Space
This paper discusses the task of tracking mentions of some topically interesting textual entity from a continuously and dynamically changing flow of text, such as a news feed, the ...
Magnus Sahlgren, Jussi Karlgren
131
Voted
FGR
2008
IEEE
166views Biometrics» more  FGR 2008»
15 years 5 months ago
Recognizing talking faces from acoustic Doppler reflections
Face recognition algorithms typically deal with the classification of static images of faces that are obtained using a camera. In this paper we propose a new sensing mechanism bas...
Kaustubh Kalgaonkar, Bhiksha Raj