Sciweavers

720 search results - page 114 / 144
» A Weighting Scheme for Star-Graphs
Sort
View
104
Voted
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
16 years 1 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
KDD
2008
ACM
120views Data Mining» more  KDD 2008»
16 years 1 months ago
Multi-class cost-sensitive boosting with p-norm loss functions
We propose a family of novel cost-sensitive boosting methods for multi-class classification by applying the theory of gradient boosting to p-norm based cost functionals. We establ...
Aurelie C. Lozano, Naoki Abe
94
Voted
RECOMB
2006
Springer
16 years 29 days ago
Domain Architecture in Homolog Identification
Homology identification is the first step for many genomic studies. Current methods, based on sequence comparison, can result in a substantial number of mis-assignments due to the ...
Nan Song, R. D. Sedgewick, Dannie Durand
104
Voted
ALT
2004
Springer
15 years 9 months ago
Relative Loss Bounds and Polynomial-Time Predictions for the k-lms-net Algorithm
We consider a two-layer network algorithm. The first layer consists of an uncountable number of linear units. Each linear unit is an LMS algorithm whose inputs are first “kerne...
Mark Herbster
SEMCO
2009
IEEE
15 years 7 months ago
Using a Formal Language Constructs for Software Model Evolution
— In this paper we present an automated support for software model evolution using a formal language constructs. For this, we extended Object Constraint Language (OCL) with actio...
Samuel A. Ajila, Shahid Alam