Sciweavers

18306 search results - page 3328 / 3662
» Algorithmics in Exponential Time
Sort
View
WWW
2009
ACM
16 years 4 months ago
Efficient overlap and content reuse detection in blogs and online news articles
The use of blogs to track and comment on real world (political, news, entertainment) events is growing. Similarly, as more individuals start relying on the Web as their primary in...
Jong Wook Kim, Jun'ichi Tatemura, K. Selçuk...
WWW
2009
ACM
16 years 4 months ago
A class-feature-centroid classifier for text categorization
Automated text categorization is an important technique for many web applications, such as document indexing, document filtering, and cataloging web resources. Many different appr...
Hu Guan, Jingyu Zhou, Minyi Guo
274
Voted
PLDI
2009
ACM
16 years 4 months ago
Efficiently and precisely locating memory leaks and bloat
Inefficient use of memory, including leaks and bloat, remain a significant challenge for C and C++ developers. Applications with these problems become slower over time as their wo...
Gene Novark, Emery D. Berger, Benjamin G. Zorn
CP
2009
Springer
16 years 3 months ago
Same-Relation Constraints
The ALLDIFFERENT constraint was one of the first global constraints [17] and it enforces the conjunction of one binary constraint, the not-equal constraint, for every pair of varia...
Christopher Jefferson, Karen E. Petrie, Meinolf Se...
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
16 years 3 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
« Prev « First page 3328 / 3662 Last » Next »