Sciweavers

5860 search results - page 1172 / 1172
» Learning and Domain Adaptation
Sort
View
ASIACRYPT
2011
Springer
12 years 4 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
IACR
2011
88views more  IACR 2011»
12 years 4 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...
ESWS
2009
Springer
13 years 9 months ago
KiWi - A Platform for Semantic Social Software (Demonstration)
Abstract. Semantic Wikis have demonstrated the power of combining Wikis with Semantic Web technology. The KiWi system goes beyond Semantic Wikis by providing a flexible and adapta...
Sebastian Schaffert, Julia Eder, Szaby Grünwa...
WWW
2009
ACM
14 years 5 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
BMCBI
2007
151views more  BMCBI 2007»
13 years 4 months ago
A comparison study on algorithms of detecting long forms for short forms in biomedical text
Motivation: With more and more research dedicated to literature mining in the biomedical domain, more and more systems are available for people to choose from when building litera...
Manabu Torii, Zhang-Zhi Hu, Min Song, Cathy H. Wu,...
« Prev « First page 1172 / 1172 Last » Next »