Sciweavers

861 search results - page 163 / 173
» From Simple Features to Sophisticated Evaluation Functions
Sort
View
CCS
2005
ACM
14 years 1 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
ISSTA
2000
ACM
13 years 12 months ago
UML-Based integration testing
Increasing numbers of software developers are using the Unified Modeling Language (UML) and associated visual modeling tools as a basis for the design and implementation of their ...
Jean Hartmann, Claudio Imoberdorf, Michael Meising...
INFOCOM
2006
IEEE
14 years 1 months ago
CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs
— Today’s IEEE 802.11 WLANs (Wireless LANs) provide multiple transmission rates so that different rates can be exploited in an adaptive manner depending on the underlying chann...
Jongseok Kim, Seongkwan Kim, Sunghyun Choi, Daji Q...
ICFP
2009
ACM
14 years 8 months ago
Parallel concurrent ML
Concurrent ML (CML) is a high-level message-passing language that supports the construction of first-class synchronous abstractions called events. This mechanism has proven quite ...
John H. Reppy, Claudio V. Russo, Yingqi Xiao
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
14 years 8 months ago
Structured learning for non-smooth ranking losses
Learning to rank from relevance judgment is an active research area. Itemwise score regression, pairwise preference satisfaction, and listwise structured learning are the major te...
Soumen Chakrabarti, Rajiv Khanna, Uma Sawant, Chir...