Sciweavers

979 search results - page 181 / 196
» Generating a Prototype from a UML Model of System Requiremen...
Sort
View
IACR
2011
94views more  IACR 2011»
12 years 8 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
CBMS
2001
IEEE
14 years 14 days ago
An Interoperable Data Architecture for Data Exchange in a Biomedical Research Network
Knowledge discovery and data correlation require a unified approach to basic data management. However, achieving such an approach is nearly impossible with hundreds of disparate d...
Daniel J. Crichton, J. Steven Hughes, Gregory J. D...
SIGSOFT
2005
ACM
14 years 9 months ago
Applying classification techniques to remotely-collected program execution data
There is an increasing interest in techniques that support measurement and analysis of fielded software systems. One of the main goals of these techniques is to better understand ...
Murali Haran, Alan F. Karr, Alessandro Orso, Adam ...
WWW
2009
ACM
14 years 9 months ago
Matchbox: large scale online bayesian recommendations
We present a probabilistic model for generating personalised recommendations of items to users of a web service. The Matchbox system makes use of content information in the form o...
David H. Stern, Ralf Herbrich, Thore Graepel
EC
2006
195views ECommerce» more  EC 2006»
13 years 8 months ago
Automated Global Structure Extraction for Effective Local Building Block Processing in XCS
Learning Classifier Systems (LCSs), such as the accuracy-based XCS, evolve distributed problem solutions represented by a population of rules. During evolution, features are speci...
Martin V. Butz, Martin Pelikan, Xavier Llorà...