Sciweavers

29 search results - page 5 / 6
» On the Need for Extended Transactional Models@Run.Time
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 4 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
TKDD
2010
121views more  TKDD 2010»
13 years 3 months ago
Factor in the neighbors: Scalable and accurate collaborative filtering
Recommender systems provide users with personalized suggestions for products or services. These systems often rely on Collaborating Filtering (CF), where past transactions are ana...
Yehuda Koren
TWC
2010
12 years 11 months ago
MMSE Based Transceiver Designs in Closed-Loop Non-Regenerative MIMO Relaying Systems
In this paper, we propose a new design strategy based on the minimum mean-squared error (MMSE) in closedloop non-regenerative multiple-input multiple-output (MIMO) relaying system...
Chang-Ick Song, Kyoung-Jae Lee, Inkyu Lee
ISPD
2012
ACM
283views Hardware» more  ISPD 2012»
12 years 9 days ago
Low-power gated bus synthesis for 3d ic via rectilinear shortest-path steiner graph
In this paper, we propose a new approach for gated bus synthesis [16] with minimum wire capacitance per transaction in three-dimensional (3D) ICs. The 3D IC technology connects di...
Chung-Kuan Cheng, Peng Du, Andrew B. Kahng, Shih-H...
KDD
2005
ACM
145views Data Mining» more  KDD 2005»
14 years 5 months ago
Using and Learning Semantics in Frequent Subgraph Mining
The search for frequent subgraphs is becoming increasingly important in many application areas including Web mining and bioinformatics. Any use of graph structures in mining, howev...
Bettina Berendt