Sciweavers

11814 search results - page 2245 / 2363
» On Generalization by Neural Networks
Sort
View
153
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
The Universal Composability framework was introduced by Canetti to study the security of protocols which are concurrently executed with other protocols in a network environment. U...
Nishanth Chandran, Vipul Goyal, Amit Sahai
126
Voted
SDM
2007
SIAM
177views Data Mining» more  SDM 2007»
15 years 5 months ago
Multi-way Clustering on Relation Graphs
A number of real-world domains such as social networks and e-commerce involve heterogeneous data that describes relations between multiple classes of entities. Understanding the n...
Arindam Banerjee, Sugato Basu, Srujana Merugu
134
Voted
SODA
2003
ACM
157views Algorithms» more  SODA 2003»
15 years 5 months ago
Competitive queueing policies for QoS switches
We consider packet scheduling in a network providing differentiated services, where each packet is assigned a value. We study various queueing models for supporting QoS (Quality ...
Nir Andelman, Yishay Mansour, An Zhu
UAI
1997
15 years 5 months ago
A Scheme for Approximating Probabilistic Inference
This paper describes a class ofprobabilistic approximation algorithms based on bucket elimination which o er adjustable levels of accuracy ande ciency. We analyzethe approximation...
Rina Dechter, Irina Rish
APVIS
2009
15 years 5 months ago
Visual support for the understanding of simulation processes
Current visualization systems are typically based on the concept of interactive post-processing. This decoupling of data visualization from the process of data generation offers a...
Andrea Unger, Heidrun Schumann
« Prev « First page 2245 / 2363 Last » Next »