Sciweavers

858 search results - page 59 / 172
» Lin's method
Sort
View
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
13 years 9 months ago
Efficient Techniques for High-Speed Elliptic Curve Cryptography
In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report ...
Patrick Longa, Catherine H. Gebotys
ASUNAM
2010
IEEE
13 years 10 months ago
Semi-Supervised Classification of Network Data Using Very Few Labels
The goal of semi-supervised learning (SSL) methods is to reduce the amount of labeled training data required by learning from both labeled and unlabeled instances. Macskassy and Pr...
Frank Lin, William W. Cohen
KDD
2010
ACM
222views Data Mining» more  KDD 2010»
13 years 10 months ago
Large linear classification when data cannot fit in memory
Recent advances in linear classification have shown that for applications such as document classification, the training can be extremely efficient. However, most of the existing t...
Hsiang-Fu Yu, Cho-Jui Hsieh, Kai-Wei Chang, Chih-J...
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 9 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
SRDS
2007
IEEE
14 years 3 months ago
Using Hidden Semi-Markov Models for Effective Online Failure Prediction
A proactive handling of faults requires that the risk of upcoming failures is continuously assessed. One of the promising approaches is online failure prediction, which means that...
Felix Salfner, Miroslaw Malek