Sciweavers

2229 search results - page 373 / 446
» Comparative analysis of biclustering algorithms
Sort
View
ESANN
2000
13 years 10 months ago
Distributed clustering and local regression for knowledge discovery in multiple spatial databases
Many large -scale spatial data analysis problems involve an investigation of relationships in heterogeneous databases. In such situations, instead of making predictions uniformly a...
Aleksandar Lazarevic, Dragoljub Pokrajac, Zoran Ob...
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 10 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 10 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
DEXA
2010
Springer
180views Database» more  DEXA 2010»
13 years 10 months ago
Identifying Interesting Instances for Probabilistic Skylines
Significant research efforts have recently been dedicated to modeling and querying uncertain data. In this paper, we focus on skyline analysis of uncertain data, modeled as uncert...
Yinian Qi, Mikhail J. Atallah
ECWEB
2010
Springer
219views ECommerce» more  ECWEB 2010»
13 years 10 months ago
Semantic Tag Cloud Generation via DBpedia
Abstract. Many current recommender systems exploit textual annotations (tags) provided by users to retrieve and suggest online contents. The text-based recommendation provided by t...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...