Sciweavers

3256 search results - page 208 / 652
» Learning Linear Transformations
Sort
View
111
Voted
ADMA
2006
Springer
167views Data Mining» more  ADMA 2006»
15 years 8 months ago
A Correlation Approach for Automatic Image Annotation
The automatic annotation of images presents a particularly complex problem for machine learning researchers. In this work we experiment with semantic models and multi-class learnin...
David R. Hardoon, Craig Saunders, Sándor Sz...
135
Voted
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
16 years 3 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
135
Voted
WSDM
2009
ACM
191views Data Mining» more  WSDM 2009»
15 years 9 months ago
Generating labels from clicks
The ranking function used by search engines to order results is learned from labeled training data. Each training point is a (query, URL) pair that is labeled by a human judge who...
Rakesh Agrawal, Alan Halverson, Krishnaram Kenthap...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 9 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
123
Voted
CCS
2008
ACM
15 years 4 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud