Sciweavers

CORR
2011
Springer
135views Education» more  CORR 2011»
12 years 9 months ago
On the Limitations of Provenance for Queries With Difference
The annotation of the results of database transformations was shown to be very effective for various applications. Until recently, most works in this context focused on positive q...
Yael Amsterdamer, Daniel Deutch, Val Tannen
CORR
2011
Springer
127views Education» more  CORR 2011»
12 years 9 months ago
Generalized Boosting Algorithms for Convex Optimization
Boosting is a popular way to derive powerful learners from simpler hypothesis classes. Following previous work (Mason et al., 1999; Friedman, 2000) on general boosting frameworks,...
Alexander Grubb, J. Andrew Bagnell
CORR
2011
Springer
197views Education» more  CORR 2011»
12 years 9 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
CORR
2011
Springer
182views Education» more  CORR 2011»
12 years 9 months ago
Adaptively Learning the Crowd Kernel
We introduce an algorithm that, given n objects, learns a similarity matrix over all n2 pairs, from crowdsourced data alone. The algorithm samples responses to adaptively chosen t...
Omer Tamuz, Ce Liu, Serge Belongie, Ohad Shamir, A...
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 9 months ago
Maximum Gain Round Trips with Cost Constraints
Searching for optimal ways in a network is an important task in multiple application areas such as social networks, co-citation graphs or road networks. In the majority of applicat...
Franz Graf, Hans-Peter Kriegel, Matthias Schubert
CORR
2011
Springer
163views Education» more  CORR 2011»
12 years 9 months ago
Suboptimal Solution Path Algorithm for Support Vector Machine
We consider a suboptimal solution path algorithm for the Support Vector Machine. The solution path algorithm is an effective tool for solving a sequence of a parametrized optimiz...
Masayuki Karasuyama, Ichiro Takeuchi
CORR
2011
Springer
192views Education» more  CORR 2011»
12 years 9 months ago
Improve performance of tcp new reno over mobile ad-hoc network using abra
Dhananjay Bisen, Sanjeev Sharma
CORR
2011
Springer
343views Education» more  CORR 2011»
12 years 9 months ago
Optimized Performance Evaluation of LTE Hard Handover Algorithm with Average RSRP Constraint
Cheng-Chung Lin, Kumbesan Sandrasegaran, Huda Adib...
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 9 months ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki