Sciweavers

29082 search results - page 5760 / 5817
» The Time-Triggered Model of Computation
Sort
View
ICISC
2008
103views Cryptology» more  ICISC 2008»
13 years 10 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
IJCAI
2007
13 years 10 months ago
Color Learning on a Mobile Robot: Towards Full Autonomy under Changing Illumination
A central goal of robotics and AI is to be able to deploy an agent to act autonomously in the real world over an extended period of time. It is commonly asserted that in order to ...
Mohan Sridharan, Peter Stone
SDM
2008
SIAM
139views Data Mining» more  SDM 2008»
13 years 10 months ago
Simultaneous Unsupervised Learning of Disparate Clusterings
Most clustering algorithms produce a single clustering for a given data set even when the data can be clustered naturally in multiple ways. In this paper, we address the difficult...
Prateek Jain, Raghu Meka, Inderjit S. Dhillon
OPODIS
2007
13 years 10 months ago
Peer to Peer Multidimensional Overlays: Approximating Complex Structures
Peer to peer overlay networks have proven to be a good support for storing and retrieving data in a fully decentralized way. A sound approach is to structure them in such a way tha...
Olivier Beaumont, Anne-Marie Kermarrec, Etienne Ri...
TREC
2008
13 years 10 months ago
TREC 2008 at the University at Buffalo: Legal and Blog Track
In the TREC 2008, the team from the State University of New York at Buffalo participated in the Legal track and the Blog track. For the Legal track, we worked on the interactive s...
Jianqiang Wang, Ying Sun, Omar Mukhtar, Rohini K. ...
« Prev « First page 5760 / 5817 Last » Next »