Sciweavers

1068 search results - page 17 / 214
» Factorization as a Rank 1 Problem
Sort
View
EMNLP
2009
14 years 7 months ago
Empirical Exploitation of Click Data for Task Specific Ranking
There have been increasing needs for task specific rankings in web search such as rankings for specific query segments like long queries, time-sensitive queries, navigational quer...
Anlei Dong, Yi Chang, Shihao Ji, Ciya Liao, Xin Li...
PKC
2007
Springer
165views Cryptology» more  PKC 2007»
15 years 3 months ago
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
Abstract. For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decry...
Noboru Kunihiro, Kaoru Kurosawa
78
Voted
GECCO
2007
Springer
192views Optimization» more  GECCO 2007»
15 years 3 months ago
On the runtime analysis of the 1-ANT ACO algorithm
The runtime analysis of randomized search heuristics is a growing field where, in the last two decades, many rigorous results have been obtained. These results, however, apply pa...
Benjamin Doerr, Frank Neumann, Dirk Sudholt, Carst...
FOCS
2008
IEEE
15 years 4 months ago
Near-Optimal Sparse Recovery in the L1 Norm
Abstract— We consider the approximate sparse recovery problem, where the goal is to (approximately) recover a highdimensional vector x ∈ Rn from its lower-dimensional sketch Ax...
Piotr Indyk, Milan Ruzic
GECCO
2008
Springer
192views Optimization» more  GECCO 2008»
14 years 10 months ago
Non-linear factor model for asset selection using multi objective genetic programming
Investors vary with respect to their expected return and aversion to associated risk, and hence also vary in their performance expectations of the stock market portfolios they hol...
Ghada Hassan