Sciweavers

8724 search results - page 1525 / 1745
» Search result diversification
Sort
View
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
15 years 10 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
CVPR
2010
IEEE
15 years 8 months ago
Parametric Dimensionality Reduction by Unsupervised Regression
We introduce a parametric version (pDRUR) of the recently proposed Dimensionality Reduction by Unsupervised Regression algorithm. pDRUR alternately minimizes reconstruction error ...
Miguel Carreira-perpinan, Zhengdong Lu
120
Voted
ICDE
2009
IEEE
133views Database» more  ICDE 2009»
15 years 8 months ago
STAR: Steiner-Tree Approximation in Relationship Graphs
— Large graphs and networks are abundant in modern information systems: entity-relationship graphs over relational data or Web-extracted entities, biological networks, social onl...
Gjergji Kasneci, Maya Ramanath, Mauro Sozio, Fabia...
94
Voted
ESA
2009
Springer
156views Algorithms» more  ESA 2009»
15 years 7 months ago
On Revenue Maximization in Second-Price Ad Auctions
Abstract. Most recent papers addressing the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions assume that pricing is done via a first...
Yossi Azar, Benjamin E. Birnbaum, Anna R. Karlin, ...
92
Voted
GECCO
2009
Springer
15 years 7 months ago
On the performance effects of unbiased module encapsulation
A recent theoretical investigation of modular representations shows that certain modularizations can introduce a distance bias into a landscape. This was a static analysis, and em...
R. Paul Wiegand, Gautham Anil, Ivan I. Garibay, Oz...
« Prev « First page 1525 / 1745 Last » Next »