Sciweavers

446 search results - page 88 / 90
» Formal concept analysis based on hierarchical class analysis
Sort
View
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 1 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
COLT
2008
Springer
13 years 9 months ago
An Information Theoretic Framework for Multi-view Learning
In the multi-view learning paradigm, the input variable is partitioned into two different views X1 and X2 and there is a target variable Y of interest. The underlying assumption i...
Karthik Sridharan, Sham M. Kakade
DKE
2006
94views more  DKE 2006»
13 years 7 months ago
Extending the data warehouse for service provisioning data
The last few years, there has been an extensive body of literature in data warehousing applications that primarily focuses on basket-type (transactional) data, common in retail in...
Yannis Kotidis
AI
1999
Springer
13 years 6 months ago
Introspective Multistrategy Learning: On the Construction of Learning Strategies
A central problem in multistrategy learning systems is the selection and sequencing of machine learning algorithms for particular situations. This is typically done by the system ...
Michael T. Cox, Ashwin Ram
COMPSAC
2010
IEEE
13 years 5 months ago
A Consistency Model for Identity Information in Distributed Systems
In distributed IT systems, replication of information is commonly used to strengthen the fault tolerance on a technical level or the autonomy of an organization on a business level...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...