Sciweavers

429 search results - page 57 / 86
» Permutative Additives and Exponentials
Sort
View
JCDL
2005
ACM
84views Education» more  JCDL 2005»
14 years 1 months ago
Finding a catalog: generating analytical catalog records from well-structured digital texts
One of the criticisms library users often make of catalogs is that they rarely include information below the bibliographic level. It is generally impossible to search a catalog fo...
David M. Mimno, Alison Jones, Gregory Crane
SPAA
2005
ACM
14 years 1 months ago
Concurrent cache-oblivious b-trees
This paper presents concurrent cache-oblivious (CO) B-trees. We extend the cache-oblivious model to a parallel or distributed setting and present three concurrent CO B-trees. Our ...
Michael A. Bender, Jeremy T. Fineman, Seth Gilbert...
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
14 years 1 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
CD
2005
Springer
14 years 1 months ago
Improving Availability in Large, Distributed Component-Based Systems Via Redeployment
In distributed and mobile environments, the connections among the hosts on which a software system is running are often unstable. As a result of connectivity losses, the overall av...
Marija Mikic-Rakic, Sam Malek, Nenad Medvidovic
COLT
2005
Springer
14 years 1 months ago
Leaving the Span
We discuss a simple sparse linear problem that is hard to learn with any algorithm that uses a linear combination of the training instances as its weight vector. The hardness holds...
Manfred K. Warmuth, S. V. N. Vishwanathan