Sciweavers

893 search results - page 164 / 179
» Relational link-based ranking
Sort
View
116
Voted
DEXAW
2008
IEEE
120views Database» more  DEXAW 2008»
15 years 10 months ago
Self-Similarity Metric for Index Pruning in Conceptual Vector Space Models
— One of the critical issues in search engines is the size of search indexes: as the number of documents handled by an engine increases, the search must preserve its efficiency,...
Dario Bonino, Fulvio Corno
130
Voted
CEC
2007
IEEE
15 years 10 months ago
Fingerprint analysis of the noisy prisoner's dilemma
Abstract— Fingerprinting is a technique that permits automatic classification of strategies for playing a game. In this study the evolution of strategies for playing the iterate...
Daniel A. Ashlock, Eun-Youn Kim, Wendy Ashlock
HYBRID
2007
Springer
15 years 9 months ago
Optimal Switches in Multi-inventory Systems
Given a switched multi–inventory system we wish to find the optimal schedule of the resets to maintain the system in a safe operating interval, while minimizing a function relat...
Dario Bauso
147
Voted
ICCS
2007
Springer
15 years 9 months ago
Characterizing Implications of Injective Partial Orders
Abstract. Previous work of the authors has studied a notion of implication between sets of sequences based on the conceptual structure of a Galois lattice, and also a way of repres...
José L. Balcázar, Gemma C. Garriga
179
Voted
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
15 years 9 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...