Sciweavers

3114 search results - page 518 / 623
» Distributed Case-Based Learning
Sort
View
101
Voted
CCS
2007
ACM
15 years 8 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
81
Voted
EUROPAR
2007
Springer
15 years 8 months ago
Experiences Understanding Performance in a Commercial Scale-Out Environment
Abstract. Clusters of loosely connected machines are becoming an important model for commercial computing. The cost/performance ratio makes these scale-out solutions an attractive ...
Robert W. Wisniewski, Reza Azimi, Mathieu Desnoyer...
135
Voted
GECCO
2007
Springer
184views Optimization» more  GECCO 2007»
15 years 8 months ago
ECGA vs. BOA in discovering stock market trading experts
This paper presents two evolutionary algorithms, ECGA and BOA, applied to constructing stock market trading expertise, which is built on the basis of a set of specific trading ru...
Piotr Lipinski
93
Voted
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 8 months ago
Division blocks and the open-ended evolution of development, form, and behavior
We present a new framework for artificial life involving physically simulated, three-dimensional blocks called Division Blocks. Division Blocks can grow and shrink, divide and fo...
Lee Spector, Jon Klein, Mark Feinstein
ICANN
2007
Springer
15 years 8 months ago
Unbiased SVM Density Estimation with Application to Graphical Pattern Recognition
Abstract. Classification of structured data (i.e., data that are represented as graphs) is a topic of interest in the machine learning community. This paper presents a different,...
Edmondo Trentin, Ernesto Di Iorio