Sciweavers

14054 search results - page 2800 / 2811
» P
Sort
View
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
11 years 9 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
ISSTA
2012
ACM
11 years 9 months ago
A human study of patch maintainability
Identifying and fixing defects is a crucial and expensive part of the software lifecycle. Measuring the quality of bug-fixing patches is a difficult task that affects both func...
Zachary P. Fry, Bryan Landau, Westley Weimer
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 9 months ago
Searching and mining trillions of time series subsequences under dynamic time warping
Most time series data mining algorithms use similarity search as a core subroutine, and thus the time taken for similarity search is the bottleneck for virtually all time series d...
Thanawin Rakthanmanon, Bilson J. L. Campana, Abdul...
SIGIR
2012
ACM
11 years 9 months ago
Cognos: crowdsourcing search for topic experts in microblogs
Finding topic experts on microblogging sites with millions of users, such as Twitter, is a hard and challenging problem. In this paper, we propose and investigate a new methodolog...
Saptarshi Ghosh, Naveen Kumar Sharma, Fabrí...
SIGIR
2012
ACM
11 years 9 months ago
Content-based retrieval for heterogeneous domains: domain adaptation by relative aggregation points
We introduce the problem of domain adaptation for content-based retrieval and propose a domain adaptation method based on relative aggregation points (RAPs). Content-based retriev...
Makoto P. Kato, Hiroaki Ohshima, Katsumi Tanaka
« Prev « First page 2800 / 2811 Last » Next »