Sciweavers

4595 search results - page 845 / 919
» Reasoning about Plans
Sort
View
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
14 years 9 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
KDD
2009
ACM
260views Data Mining» more  KDD 2009»
14 years 9 months ago
Enabling analysts in managed services for CRM analytics
Data analytics tools and frameworks abound, yet rapid deployment of analytics solutions that deliver actionable insights from business data remains a challenge. The primary reason...
Indrajit Bhattacharya, Shantanu Godbole, Ajay Gupt...
KDD
2008
ACM
140views Data Mining» more  KDD 2008»
14 years 9 months ago
Semi-supervised approach to rapid and reliable labeling of large data sets
Supervised classification methods have been shown to be very effective for a large number of applications. They require a training data set whose instances are labeled to indicate...
György J. Simon, Vipin Kumar, Zhi-Li Zhang
KDD
2005
ACM
137views Data Mining» more  KDD 2005»
14 years 9 months ago
A generalized framework for mining spatio-temporal patterns in scientific data
In this paper, we present a general framework to discover spatial associations and spatio-temporal episodes for scientific datasets. In contrast to previous work in this area, fea...
Hui Yang, Srinivasan Parthasarathy, Sameep Mehta
KDD
2003
ACM
269views Data Mining» more  KDD 2003»
14 years 9 months ago
Maximizing the spread of influence through a social network
Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technolog...
David Kempe, Jon M. Kleinberg, Éva Tardos