Sciweavers

592 search results - page 110 / 119
» Learning of personalized security settings
Sort
View
GECCO
2010
Springer
248views Optimization» more  GECCO 2010»
13 years 11 months ago
Integrating decision space diversity into hypervolume-based multiobjective search
Multiobjective optimization in general aims at learning about the problem at hand. Usually the focus lies on objective space properties such as the front shape and the distributio...
Tamara Ulrich, Johannes Bader, Eckart Zitzler
KDD
2010
ACM
242views Data Mining» more  KDD 2010»
13 years 9 months ago
A scalable two-stage approach for a class of dimensionality reduction techniques
Dimensionality reduction plays an important role in many data mining applications involving high-dimensional data. Many existing dimensionality reduction techniques can be formula...
Liang Sun, Betul Ceran, Jieping Ye
WSDM
2012
ACM
309views Data Mining» more  WSDM 2012»
12 years 3 months ago
Mining contrastive opinions on political texts using cross-perspective topic model
This paper presents a novel opinion mining research problem, which is called Contrastive Opinion Modeling (COM). Given any query topic and a set of text collections from multiple ...
Yi Fang, Luo Si, Naveen Somasundaram, Zhengtao Yu
CCS
2003
ACM
14 years 28 days ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
EUROCRYPT
2010
Springer
14 years 15 days ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...