Sciweavers

1439 search results - page 193 / 288
» Bagging with Adaptive Costs
Sort
View
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
14 years 10 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
KDD
2002
ACM
110views Data Mining» more  KDD 2002»
14 years 10 months ago
A model for discovering customer value for E-content
There exists a huge demand for multimedia goods and services in the Internet. Currently available bandwidth speeds can support sale of downloadable content like CDs, e-books, etc....
Srinivasan Jagannathan, Jayanth Nayak, Kevin C. Al...
KDD
2002
ACM
169views Data Mining» more  KDD 2002»
14 years 10 months ago
Optimizing search engines using clickthrough data
This paper presents an approach to automatically optimizing the retrieval quality of search engines using clickthrough data. Intuitively, a good information retrieval system shoul...
Thorsten Joachims
CHI
2005
ACM
14 years 10 months ago
The uses of personal networked digital imaging: an empirical study of cameraphone photos and sharing
Developments in networked digital imaging promise to substantially affect the near-universal experience of personal photography. Designing technology for image capture and sharing...
Nancy A. Van House, Marc Davis, Morgan Ames, Megan...
HPCA
2008
IEEE
14 years 10 months ago
CMP network-on-chip overlaid with multi-band RF-interconnect
In this paper, we explore the use of multi-band radio frequency interconnect (or RF-I) with signal propagation at the speed of light to provide shortcuts in a many core network-on...
M. Frank Chang, Jason Cong, Adam Kaplan, Mishali N...