Sciweavers

15120 search results - page 2862 / 3024
» Learning with Local Models
Sort
View
ACL
2012
12 years 23 days ago
Named Entity Disambiguation in Streaming Data
The named entity disambiguation task is to resolve the many-to-many correspondence between ambiguous names and the unique realworld entity. This task can be modeled as a classifi...
Alexandre Davis, Adriano Veloso, Altigran Soares d...
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
12 years 23 days ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
SDM
2012
SIAM
282views Data Mining» more  SDM 2012»
12 years 22 days ago
Citation Prediction in Heterogeneous Bibliographic Networks
To reveal information hiding in link space of bibliographical networks, link analysis has been studied from different perspectives in recent years. In this paper, we address a no...
Xiao Yu, Quanquan Gu, Mianwei Zhou, Jiawei Han
AAAI
2012
12 years 22 days ago
Far Out: Predicting Long-Term Human Mobility
Much work has been done on predicting where is one going to be in the immediate future, typically within the next hour. By contrast, we address the open problem of predicting huma...
Adam Sadilek, John Krumm
CCS
2009
ACM
14 years 11 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
« Prev « First page 2862 / 3024 Last » Next »