Sciweavers

1005 search results - page 153 / 201
» Practical Secure Function Evaluation
Sort
View
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 3 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
DEXA
2008
Springer
176views Database» more  DEXA 2008»
14 years 4 days ago
Inventing Less, Reusing More, and Adding Intelligence to Business Process Modeling
Recently, a variety of workflow patterns has been proposed focusing on specific aspects like control flow, data flow, and resource assignments. Though these patterns are relevant f...
Lucinéia Heloisa Thom, Manfred Reichert, Ca...
DIMVA
2007
13 years 11 months ago
Protecting the Intranet Against "JavaScript Malware" and Related Attacks
The networking functionality of JavaScript is restricted by the Same Origin Policy (SOP). However, as the SOP applies on a document level, JavaScript still possesses certain functi...
Martin Johns, Justus Winter
IJCAI
2007
13 years 11 months ago
Kernel Conjugate Gradient for Fast Kernel Machines
We propose a novel variant of the conjugate gradient algorithm, Kernel Conjugate Gradient (KCG), designed to speed up learning for kernel machines with differentiable loss functio...
Nathan D. Ratliff, J. Andrew Bagnell
NIPS
2007
13 years 11 months ago
Multi-task Gaussian Process Prediction
In this paper we investigate multi-task learning in the context of Gaussian Processes (GP). We propose a model that learns a shared covariance function on input-dependent features...
Edwin V. Bonilla, Kian Ming Chai, Christopher K. I...