Sciweavers

1485 search results - page 295 / 297
» Group-Induced Vector Spaces
Sort
View
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
EUROCRYPT
2005
Springer
14 years 1 months ago
Floating-Point LLL Revisited
The Lenstra-Lenstra-Lov´asz lattice basis reduction algorithm (LLL or L3 ) is a very popular tool in public-key cryptanalysis and in many other fields. Given an integer d-dimensi...
Phong Q. Nguyen, Damien Stehlé
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
14 years 1 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
SIGIR
2004
ACM
14 years 29 days ago
An automatic weighting scheme for collaborative filtering
Collaborative filtering identifies information interest of a particular user based on the information provided by other similar users. The memory-based approaches for collaborativ...
Rong Jin, Joyce Y. Chai, Luo Si
AIS
2004
Springer
14 years 28 days ago
Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval
This project implements an integrated biological information website that classifies technical documents, learns about users' interests, and offers intuitive interactive visua...
Min Hong, Anis Kairmpour-fard, Steve Russell, Lawr...