Sciweavers

3820 search results - page 603 / 764
» Bounded Model Debugging
Sort
View
CORR
2011
Springer
136views Education» more  CORR 2011»
14 years 6 months ago
Eliciting Forecasts from Self-interested Experts: Scoring Rules for Decision Makers
Scoring rules for eliciting expert predictions of random variables are usually developed assuming that experts derive utility only from the quality of their predictions (e.g., sco...
Craig Boutilier
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 6 months ago
Pseudo-random graphs and bit probe schemes with one-sided error
We study probabilistic bit-probe schemes for the membership problem. Given a set A of at most n elements from the universe of size m we organize such a structure that queries of t...
Andrei E. Romashchenko
160
Voted
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
14 years 2 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
ICDE
2012
IEEE
228views Database» more  ICDE 2012»
13 years 5 months ago
A General Method for Estimating Correlated Aggregates over a Data Stream
—On a stream of two dimensional data items (x, y) where x is an item identifier, and y is a numerical attribute, a correlated aggregate query requires us to first apply a selec...
Srikanta Tirthapura, David P. Woodruff
KDD
2012
ACM
207views Data Mining» more  KDD 2012»
13 years 5 months ago
Robust multi-task feature learning
Multi-task learning (MTL) aims to improve the performance of multiple related tasks by exploiting the intrinsic relationships among them. Recently, multi-task feature learning alg...
Pinghua Gong, Jieping Ye, Changshui Zhang