Sciweavers

709 search results - page 71 / 142
» Threshold Setting and Performance Optimization in Adaptive F...
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
13 years 11 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
EUROCRYPT
2007
Springer
13 years 11 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
14 years 1 months ago
FACT: A New Fuzzy Adaptive Clustering Technique
Clustering belongs to the set of mathematical problems which aim at classification of data or objects into related sets or classes. Many different pattern clustering approaches bas...
Faezeh Ensan, Mohammad Hossien Yaghmaee, Ebrahim B...
ICML
2010
IEEE
13 years 5 months ago
Temporal Difference Bayesian Model Averaging: A Bayesian Perspective on Adapting Lambda
Temporal difference (TD) algorithms are attractive for reinforcement learning due to their ease-of-implementation and use of "bootstrapped" return estimates to make effi...
Carlton Downey, Scott Sanner
BMCBI
2008
228views more  BMCBI 2008»
13 years 8 months ago
Adaptive diffusion kernel learning from biological networks for protein function prediction
Background: Machine-learning tools have gained considerable attention during the last few years for analyzing biological networks for protein function prediction. Kernel methods a...
Liang Sun, Shuiwang Ji, Jieping Ye