Sciweavers

402 search results - page 42 / 81
» Cryptosystems using Linear Groups
Sort
View
DEXAW
2007
IEEE
116views Database» more  DEXAW 2007»
15 years 4 months ago
Regression Relevance Models for Data Fusion
Data fusion has been investigated by many researchers in the information retrieval community and has become an effective technique for improving retrieval effectiveness. In this p...
Shengli Wu, Yaxin Bi, Sally I. McClean
TKDD
2008
113views more  TKDD 2008»
14 years 10 months ago
Privacy-preserving classification of vertically partitioned data via random kernels
We propose a novel privacy-preserving support vector machine (SVM) classifier for a data matrix A whose input feature columns are divided into groups belonging to different entiti...
Olvi L. Mangasarian, Edward W. Wild, Glenn Fung
CN
2000
80views more  CN 2000»
14 years 9 months ago
An entropy approach to unintrusive targeted advertising on the Web
This paper describes the formulation of a new model for unintrusive targeted advertising on the web, extending the linear programming approach taken by Langheinrich et al.[10] A f...
John A. Tomlin
TSE
2002
96views more  TSE 2002»
14 years 9 months ago
Better Reliability Assessment and Prediction through Data Clustering
This paper presents a new approach to software reliability modeling by grouping data into clusters of homogeneous failure intensities. This series of data clusters associated with...
Jeff Tian

Publication
101views
13 years 3 months ago
On the degree and half-degree principle for symmetric polynomials
In this note we aim to give a new, elementary proof of a statement that was first proved by Timofte (2003) [15]. It says that a symmetric real polynomial F of degree d in n variabl...
Cordian Riener