Sciweavers

464 search results - page 70 / 93
» hybrid 2009
Sort
View
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
14 years 10 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
KDD
2009
ACM
142views Data Mining» more  KDD 2009»
14 years 10 months ago
Quantification and semi-supervised classification methods for handling changes in class distribution
In realistic settings the prevalence of a class may change after a classifier is induced and this will degrade the performance of the classifier. Further complicating this scenari...
Jack Chongjie Xue, Gary M. Weiss
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 10 months ago
Query result clustering for object-level search
Query result clustering has recently attracted a lot of attention to provide users with a succinct overview of relevant results. However, little work has been done on organizing t...
Jongwuk Lee, Seung-won Hwang, Zaiqing Nie, Ji-Rong...
SIGMOD
2009
ACM
218views Database» more  SIGMOD 2009»
14 years 10 months ago
DejaVu: declarative pattern matching over live and archived streams of events
DejaVu is an event processing system that integrates declarative pattern matching over live and archived streams of events on top of a novel system architecture. We propose to dem...
Nihal Dindar, Baris Güç, Patrick Lau, ...
SDM
2009
SIAM
196views Data Mining» more  SDM 2009»
14 years 7 months ago
MultiVis: Content-Based Social Network Exploration through Multi-way Visual Analysis.
With the explosion of social media, scalability becomes a key challenge. There are two main aspects of the problems that arise: 1) data volume: how to manage and analyze huge data...
Ching-Yung Lin, Jimeng Sun, Nan Cao, Shixia Liu, S...