Sciweavers

2780 search results - page 489 / 556
» Learning to Order Things
Sort
View
ASIACRYPT
2010
Springer
13 years 8 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
CIKM
2010
Springer
13 years 8 months ago
Wisdom of the ages: toward delivering the children's web with the link-based agerank algorithm
Though children frequently use web search engines to learn, interact, and be entertained, modern web search engines are poorly suited to children's needs, requiring relativel...
Karl Gyllstrom, Marie-Francine Moens
CLOUDCOM
2010
Springer
13 years 8 months ago
Bag-of-Tasks Scheduling under Budget Constraints
Commercial cloud offerings, such as Amazon's EC2, let users allocate compute resources on demand, charging based on reserved time intervals. While this gives great flexibilit...
Ana-Maria Oprescu, Thilo Kielmann
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
13 years 8 months ago
Causal Discovery from Streaming Features
In this paper, we study a new research problem of causal discovery from streaming features. A unique characteristic of streaming features is that not all features can be available ...
Kui Yu, Xindong Wu, Hao Wang, Wei Ding
ICPR
2010
IEEE
13 years 8 months ago
Boosting Bayesian MAP Classification
In this paper we redefine and generalize the classic k-nearest neighbors (k-NN) voting rule in a Bayesian maximum-a-posteriori (MAP) framework. Therefore, annotated examples are u...
Paolo Piro, Richard Nock, Frank Nielsen, Michel Ba...