Sciweavers

154 search results - page 13 / 31
» Spam Construction Trends
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
IJISEC
2010
114views more  IJISEC 2010»
13 years 5 months ago
A new hardware-assisted PIR with O(n) shuffle cost
Abstract Since the concept of private information retrieval (PIR) was first formalized by Chor et. al, various constructions have been proposed with a common goal of reducing commu...
Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong...
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
Multiple Kernel Learning on the Limit Order Book
Simple features constructed from order book data for the EURUSD currency pair were used to construct a set of kernels. These kernels were used both individually and simultaneously...
Tristan Fletcher, Zakria Hussain, John Shawe-Taylo...
HPCA
2007
IEEE
14 years 8 months ago
Illustrative Design Space Studies with Microarchitectural Regression Models
We apply a scalable approach for practical, comprehensive design space evaluation and optimization. This approach combines design space sampling and statistical inference to ident...
Benjamin C. Lee, David M. Brooks
ICTAI
2002
IEEE
14 years 19 days ago
Data Mining for Selective Visualization of Large Spatial Datasets
Data mining is the process of extracting implicit, valuable, and interesting information from large sets of data. Visualization is the process of visually exploring data for patte...
Shashi Shekhar, Chang-Tien Lu, Pusheng Zhang, Ruli...