Sciweavers

2735 search results - page 358 / 547
» Comparing notions of randomness
Sort
View
116
Voted
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
14 years 27 days ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
230
Voted
SIGMOD
2009
ACM
250views Database» more  SIGMOD 2009»
16 years 1 months ago
Query processing techniques for solid state drives
Solid state drives perform random reads more than 100x faster than traditional magnetic hard disks, while offering comparable sequential read and write bandwidth. Because of their...
Dimitris Tsirogiannis, Stavros Harizopoulos, Mehul...
84
Voted
CVPR
2007
IEEE
16 years 3 months ago
Multi-modal Clustering for Multimedia Collections
Most of the online multimedia collections, such as picture galleries or video archives, are categorized in a fully manual process, which is very expensive and may soon be infeasib...
Ron Bekkerman, Jiwoon Jeon
ISQED
2009
IEEE
133views Hardware» more  ISQED 2009»
15 years 8 months ago
A novel ACO-based pattern generation for peak power estimation in VLSI circuits
Estimation of maximal power consumption is an essential task in VLSI circuit realizations since power value significantly affects the reliability of the circuits. The key issue o...
Yi-Ling Liu, Chun-Yao Wang, Yung-Chih Chen, Ya-Hsi...
118
Voted
CIKM
2009
Springer
15 years 7 months ago
Feature selection for ranking using boosted trees
Modern search engines have to be fast to satisfy users, so there are hard back-end latency requirements. The set of features useful for search ranking functions, though, continues...
Feng Pan, Tim Converse, David Ahn, Franco Salvetti...