Sciweavers

35419 search results - page 137 / 7084
» How are we doing
Sort
View
SSS
2009
Springer
115views Control Systems» more  SSS 2009»
15 years 8 months ago
How to Improve Snap-Stabilizing Point-to-Point Communication Space Complexity?
A snap-stabilizing protocol, starting from any configuration, always behaves according to its specification. In this paper, we are interested in message forwarding problem in a m...
Alain Cournier, Swan Dubois, Vincent Villain
OTM
2005
Springer
15 years 9 months ago
Biomedical Retrieval: How Can a Thesaurus Help?
Abstract. Searching specialized collections, such as biomedical literature, typically requires intimate knowledge of a specialized terminology. Hence, it can be a disappointing exp...
Leonie IJzereef, Jaap Kamps, Maarten de Rijke
ASIACRYPT
2009
Springer
15 years 7 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
118
Voted
COLT
2008
Springer
15 years 5 months ago
How Local Should a Learning Method Be?
We consider the question of why modern machine learning methods like support vector machines outperform earlier nonparametric techniques like kNN. Our approach investigates the lo...
Alon Zakai, Yaacov Ritov
116
Voted
ICASSP
2011
IEEE
14 years 7 months ago
How efficient is estimation with missing data?
In this paper, we present a new evaluation approach for missing data techniques (MDTs) where the efficiency of those are investigated using listwise deletion method as reference....
Seliz G. Karadogan, Letizia Marchegiani, Lars Kai ...