Sciweavers

700 search results - page 30 / 140
» et 2008
Sort
View
IACR
2011
121views more  IACR 2011»
12 years 7 months ago
Two RFID Privacy Models in Front of a Court
In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited...
Mohammad Hassan Habibi, Mohammad Reza Aref
COLING
1996
13 years 9 months ago
Using Discourse Predictions for Ambiguity Resolution
In this paper we discuss how we allply discourse predictions along with non context-based predictions to the problem of parse disambiguation in Enthusiast, a Spanish-to-English tr...
Yan Qu, Carolyn Penstein Rosé, Barbara Di E...
CLUSTER
2008
IEEE
14 years 2 months ago
Divisible load scheduling with improved asymptotic optimality
—Divisible load model allows scheduling algorithms that give nearly optimal makespan with practical computational complexity. Beaumont et al. have shown that their algorithm prod...
Reiji Suda
ICML
2009
IEEE
14 years 8 months ago
Interactively optimizing information retrieval systems as a dueling bandits problem
We present an on-line learning framework tailored towards real-time learning from observed user behavior in search engines and other information retrieval systems. In particular, ...
Yisong Yue, Thorsten Joachims
JMLR
2010
93views more  JMLR 2010»
13 years 2 months ago
Erratum: SGDQN is Less Careful than Expected
The SGD-QN algorithm described in (Bordes et al., 2009) contains a subtle flaw that prevents it from reaching its design goals. Yet the flawed SGD-QN algorithm has worked well eno...
Antoine Bordes, Léon Bottou, Patrick Gallin...