Sciweavers

2342 search results - page 16 / 469
» Sublinear geometric algorithms
Sort
View
KDD
2010
ACM
214views Data Mining» more  KDD 2010»
13 years 11 months ago
Neighbor query friendly compression of social networks
Compressing social networks can substantially facilitate mining and advanced analysis of large social networks. Preferably, social networks should be compressed in a way that they...
Hossein Maserrat, Jian Pei
CRYPTO
2008
Springer
132views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Public-Key Locally-Decodable Codes
In this paper we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In particular, we allow any polynomialtime ...
Brett Hemenway, Rafail Ostrovsky
ICML
2010
IEEE
13 years 8 months ago
Gaussian Process Optimization in the Bandit Setting: No Regret and Experimental Design
Many applications require optimizing an unknown, noisy function that is expensive to evaluate. We formalize this task as a multiarmed bandit problem, where the payoff function is ...
Niranjan Srinivas, Andreas Krause, Sham Kakade, Ma...
CCS
2010
ACM
13 years 5 months ago
Ad hoc broadcast encryption
Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
CVPR
2011
IEEE
13 years 3 months ago
Scalable Multi-class Object Detection
Scalability of object detectors with respect to the number of classes is a very important issue for applications where many object classes need to be detected. While combining sin...
Nima Razavi, Juergen Gall, Luc VanGool