Sciweavers

2061 search results - page 391 / 413
» Authorization for Metacomputing Applications
Sort
View
KDD
2010
ACM
250views Data Mining» more  KDD 2010»
15 years 3 days ago
On community outliers and their efficient detection in information networks
Linked or networked data are ubiquitous in many applications. Examples include web data or hypertext documents connected via hyperlinks, social networks or user profiles connected...
Jing Gao, Feng Liang, Wei Fan, Chi Wang, Yizhou Su...
ELPUB
2008
ACM
14 years 12 months ago
A review of journal policies for sharing research data
Background: Sharing data is a tenet of science, yet commonplace in only a few subdisciplines. Recognizing that a data sharing culture is unlikely to be achieved without policy gui...
Heather A. Piwowar, Wendy Webber Chapman
113
Voted
EUROCRYPT
2008
Springer
14 years 12 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
EUROISI
2008
14 years 12 months ago
Buzz Monitoring in Word Space
This paper discusses the task of tracking mentions of some topically interesting textual entity from a continuously and dynamically changing flow of text, such as a news feed, the ...
Magnus Sahlgren, Jussi Karlgren
FGR
2008
IEEE
166views Biometrics» more  FGR 2008»
14 years 12 months ago
Recognizing talking faces from acoustic Doppler reflections
Face recognition algorithms typically deal with the classification of static images of faces that are obtained using a camera. In this paper we propose a new sensing mechanism bas...
Kaustubh Kalgaonkar, Bhiksha Raj