Sciweavers

2882 search results - page 520 / 577
» Enhancements to the Voting Algorithm
Sort
View
KDD
2009
ACM
219views Data Mining» more  KDD 2009»
16 years 4 months ago
Structured correspondence topic models for mining captioned figures in biological literature
A major source of information (often the most crucial and informative part) in scholarly articles from scientific journals, proceedings and books are the figures that directly pro...
Amr Ahmed, Eric P. Xing, William W. Cohen, Robert ...
KDD
2008
ACM
213views Data Mining» more  KDD 2008»
16 years 4 months ago
Heterogeneous data fusion for alzheimer's disease study
Effective diagnosis of Alzheimer's disease (AD) is of primary importance in biomedical research. Recent studies have demonstrated that neuroimaging parameters are sensitive a...
Jieping Ye, Kewei Chen, Teresa Wu, Jing Li, Zheng ...
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 4 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng
STOC
2006
ACM
120views Algorithms» more  STOC 2006»
16 years 4 months ago
Black-box constructions for secure computation
d abstract) Yuval Ishai Eyal Kushilevitz Yehuda Lindell Erez Petrank It is well known that the secure computation of non-trivial functionalities in the setting of no honest majori...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
STOC
2004
ACM
153views Algorithms» more  STOC 2004»
16 years 4 months ago
Bounded-concurrent secure multi-party computation with a dishonest majority
We show how to securely realize any multi-party functionality in a way that preserves security under an a-priori bounded number of concurrent executions, regardless of the number ...
Rafael Pass