Sciweavers

2938 search results - page 528 / 588
» On obfuscating point functions
Sort
View
POPL
2001
ACM
14 years 10 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
RECOMB
2002
Springer
14 years 10 months ago
A new approach to analyzing gene expression time series data
We present algorithms for time-series gene expression analysis that permit the principled estimation of unobserved timepoints, clustering, and dataset alignment. Each expression p...
Ziv Bar-Joseph, Georg Gerber, David K. Gifford, To...
ICALP
2009
Springer
14 years 10 months ago
Learning Halfspaces with Malicious Noise
We give new algorithms for learning halfspaces in the challenging malicious noise model, where an adversary may corrupt both the labels and the underlying distribution of examples....
Adam R. Klivans, Philip M. Long, Rocco A. Servedio
SIGMOD
2007
ACM
165views Database» more  SIGMOD 2007»
14 years 10 months ago
Statistical analysis of sketch estimators
Sketching techniques can provide approximate answers to aggregate queries either for data-streaming or distributed computation. Small space summaries that have linearity propertie...
Florin Rusu, Alin Dobra
SIGMOD
2003
ACM
237views Database» more  SIGMOD 2003»
14 years 10 months ago
Qcluster: Relevance Feedback Using Adaptive Clustering for Content-Based Image Retrieval
The learning-enhanced relevance feedback has been one of the most active research areas in content-based image retrieval in recent years. However, few methods using the relevance ...
Deok-Hwan Kim, Chin-Wan Chung