Sciweavers

325 search results - page 34 / 65
» Remarks on the Schoof-Elkies-Atkin algorithm
Sort
View
SIGIR
2008
ACM
13 years 9 months ago
Learning query intent from regularized click graphs
This work presents the use of click graphs in improving query intent classifiers, which are critical if vertical search and general-purpose search services are to be offered in a ...
Xiao Li, Ye-Yi Wang, Alex Acero
BMCBI
2005
158views more  BMCBI 2005»
13 years 9 months ago
Automated generation of heuristics for biological sequence comparison
Background: Exhaustive methods of sequence alignment are accurate but slow, whereas heuristic approaches run quickly, but their complexity makes them more difficult to implement. ...
Guy St. C. Slater, Ewan Birney
TWC
2008
120views more  TWC 2008»
13 years 9 months ago
Binary Power Control for Sum Rate Maximization over Multiple Interfering Links
We consider allocating the transmit powers for a wireless multi-link (N-link) system, in order to maximize the total system throughput under interference and noise impairments, and...
Anders Gjendemsjø, David Gesbert, Geir E. &...
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 9 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
IACR
2011
128views more  IACR 2011»
12 years 9 months ago
Sign Modules in Secure Arithmetic Circuits
In this paper, we study the complexity of secure multiparty computation using only the secure arithmetic black-box of a finite field, counting the cost by the number of secure m...
Ching-Hua Yu