Sciweavers

10414 search results - page 1928 / 2083
» An efficient algorithm for Co-segmentation
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 3 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
SPAA
2009
ACM
16 years 3 months ago
Brief announcement: parameterized maximum and average degree approximation in topic-based publish-subscribe overlay network desi
Designing an overlay network for publish/subscribe communication in a system where nodes may subscribe to many different topics of interest is of fundamental importance. For scala...
Melih Onus, Andréa W. Richa
KDD
2009
ACM
219views Data Mining» more  KDD 2009»
16 years 3 months ago
Structured correspondence topic models for mining captioned figures in biological literature
A major source of information (often the most crucial and informative part) in scholarly articles from scientific journals, proceedings and books are the figures that directly pro...
Amr Ahmed, Eric P. Xing, William W. Cohen, Robert ...
134
Voted
KDD
2009
ACM
152views Data Mining» more  KDD 2009»
16 years 3 months ago
A multi-relational approach to spatial classification
Spatial classification is the task of learning models to predict class labels based on the features of entities as well as the spatial relationships to other entities and their fe...
Richard Frank, Martin Ester, Arno Knobbe
KDD
2009
ACM
245views Data Mining» more  KDD 2009»
16 years 3 months ago
Mining rich session context to improve web search
User browsing information, particularly their non-search related activity, reveals important contextual information on the preferences and the intent of web users. In this paper, ...
Guangyu Zhu, Gilad Mishne
« Prev « First page 1928 / 2083 Last » Next »