Sciweavers

275 search results - page 48 / 55
» Learning with Errors over Rings
Sort
View
PASTE
2010
ACM
14 years 23 days ago
Extracting compiler provenance from program binaries
We present a novel technique that identifies the source compiler of program binaries, an important element of program provenance. Program provenance answers fundamental questions...
Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu
AAAI
2007
13 years 10 months ago
A Randomized String Kernel and Its Application to RNA Interference
String kernels directly model sequence similarities without the necessity of extracting numerical features in a vector space. Since they better capture complex traits in the seque...
Shibin Qiu, Terran Lane, Ljubomir J. Buturovic
CDC
2008
IEEE
149views Control Systems» more  CDC 2008»
13 years 9 months ago
Distributed computation under bit constraints
Abstract-- A network of nodes communicate via noisy channels. Each node has some real-valued initial measurement or message. The goal of each of the nodes is to acquire an estimate...
Ola Ayaso, Devavrat Shah, Munther A. Dahleh
COLING
2008
13 years 9 months ago
A Supervised Algorithm for Verb Disambiguation into VerbNet Classes
VerbNet (VN) is a major large-scale English verb lexicon. Mapping verb instances to their VN classes has been proven useful for several NLP tasks. However, verbs are polysemous wi...
Omri Abend, Roi Reichart, Ari Rappoport
AAAI
2006
13 years 9 months ago
Bayesian Reputation Modeling in E-Marketplaces Sensitive to Subjectivity, Deception and Change
We present a model for buying agents in e-marketplaces to interpret evaluations of sellers provided by other buying agents, known as advisors. The interpretation of seller evaluat...
Kevin Regan, Pascal Poupart, Robin Cohen