Sciweavers

1515 search results - page 170 / 303
» Prediction without markets
Sort
View
NDSS
2005
IEEE
15 years 10 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
CICLING
2005
Springer
15 years 10 months ago
Instance Pruning by Filtering Uninformative Words: An Information Extraction Case Study
In this paper we present a novel instance pruning technique for Information Extraction (IE). In particular, our technique filters out uninformative words from texts on the basis o...
Alfio Massimiliano Gliozzo, Claudio Giuliano, Raff...
CIS
2004
Springer
15 years 10 months ago
Knowledge Maintenance on Data Streams with Concept Drifting
Concept drifting in data streams often occurs unpredictably at any time. Currently many classification mining algorithms deal with this problem by using an incremental learning ap...
Juggapong Natwichai, Xue Li
ISWC
2003
IEEE
15 years 9 months ago
Unsupervised, Dynamic Identification of Physiological and Activity Context in Wearable Computing
Context-aware computing describes the situation where a wearable / mobile computer is aware of its user’s state and surroundings and modifies its behavior based on this informat...
Andreas Krause, Daniel P. Siewiorek, Asim Smailagi...
LCN
2003
IEEE
15 years 9 months ago
Characterization of the Burst Stabilization Protocol for the RR/RR CICQ Switch
Input buffered switches with Virtual Output Queueing (VOQ) can be unstable when presented with unbalanced loads. Existing scheduling algorithms, including iSLIP for Input Queued (...
Neil J. Gunther, Kenneth J. Christensen, Kenji Yos...