Sciweavers

4208 search results - page 500 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 7 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
272
Voted
ECAI
2010
Springer
15 years 4 months ago
Bayesian Monte Carlo for the Global Optimization of Expensive Functions
In the last decades enormous advances have been made possible for modelling complex (physical) systems by mathematical equations and computer algorithms. To deal with very long run...
Perry Groot, Adriana Birlutiu, Tom Heskes
HPDC
2010
IEEE
15 years 4 months ago
Resource provisioning with budget constraints for adaptive applications in cloud environments
The recent emergence of clouds is making the vision of utility computing realizable, i.e. computing resources and services can be delivered, utilized, and paid for as utilities su...
Qian Zhu, Gagan Agrawal
140
Voted
HPDC
2010
IEEE
15 years 4 months ago
Massive Semantic Web data compression with MapReduce
The Semantic Web consists of many billions of statements made of terms that are either URIs or literals. Since these terms usually consist of long sequences of characters, an effe...
Jacopo Urbani, Jason Maassen, Henri E. Bal
105
Voted
CORR
2008
Springer
159views Education» more  CORR 2008»
15 years 3 months ago
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data
We consider privacy preserving decision tree induction via ID3 in the case where the training data is horizontally or vertically distributed. Furthermore, we consider the same pro...
Bart Kuijpers, Vanessa Lemmens, Bart Moelans, Karl...