Sciweavers

784 search results - page 146 / 157
» Histogram-based search: A comparative study
Sort
View
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
14 years 3 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
CIKM
2009
Springer
14 years 1 months ago
Semi-nonnegative matrix factorization with global statistical consistency for collaborative filtering
Collaborative Filtering, considered by many researchers as the most important technique for information filtering, has been extensively studied by both academic and industrial co...
Hao Ma, Haixuan Yang, Irwin King, Michael R. Lyu
GECCO
2009
Springer
14 years 1 months ago
On the performance effects of unbiased module encapsulation
A recent theoretical investigation of modular representations shows that certain modularizations can introduce a distance bias into a landscape. This was a static analysis, and em...
R. Paul Wiegand, Gautham Anil, Ivan I. Garibay, Oz...
MHCI
2009
Springer
14 years 1 months ago
Designing phrase builder: a mobile real-time query expansion interface
As users enter web queries, real-time query expansion (RTQE) interfaces offer suggestions based on an index garnered from query logs. In selecting a suggestion, users can potentia...
Tim Paek, Bongshin Lee, Bo Thiesson
ASPDAC
2009
ACM
152views Hardware» more  ASPDAC 2009»
14 years 1 months ago
A novel Toffoli network synthesis algorithm for reversible logic
—Reversible logic studies have promising potential on energy lossless circuit design, quantum computation, nanotechnology, etc. Reversible logic features a one-to-one input outpu...
Yexin Zheng, Chao Huang