Sciweavers

2424 search results - page 321 / 485
» A general algorithm for data dependence analysis
Sort
View
107
Voted
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
15 years 9 months ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum
130
Voted
CORR
2011
Springer
186views Education» more  CORR 2011»
14 years 10 months ago
Similarity Join Size Estimation using Locality Sensitive Hashing
Similarity joins are important operations with a broad range of applications. In this paper, we study the problem of vector similarity join size estimation (VSJ). It is a generali...
Hongrae Lee, Raymond T. Ng, Kyuseok Shim
132
Voted
GECCO
2010
Springer
194views Optimization» more  GECCO 2010»
15 years 8 months ago
Fitting multi-planet transit models to photometric time-data series by evolution strategies
In this paper we present the application of an evolution strategy to the problem of detecting multi-planet transit events in photometric time-data series. Planetary transits occur...
Andreas M. Chwatal, Günther R. Raidl, Michael...
140
Voted
ML
2010
ACM
185views Machine Learning» more  ML 2010»
14 years 10 months ago
Learning to rank on graphs
Graph representations of data are increasingly common. Such representations arise in a variety of applications, including computational biology, social network analysis, web applic...
Shivani Agarwal
135
Voted
SC
2005
ACM
15 years 9 months ago
Bridging the Macro and Micro: A Computing Intensive Earthquake Study Using Discovery Net
We present the development and use of a novel distributed geohazard modeling environment for the analysis and interpretation of large scale earthquake data sets. Our work demonstr...
Yike Guo, Jian Guo Liu, Moustafa Ghanem, Kyran Mis...