Sciweavers

9359 search results - page 215 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
149
Voted
GECCO
2008
Springer
171views Optimization» more  GECCO 2008»
15 years 5 months ago
Particle swarm clustering ensemble
Extracting natural groups of the unlabeled data is known as clustering. To improve the stability and robustness of the clustering outputs, clustering ensembles have emerged recent...
Abbas Ahmadi, Fakhri Karray, Mohamed Kamel
196
Voted
PODC
2012
ACM
13 years 7 months ago
Byzantine broadcast in point-to-point networks using local linear coding
The goal of Byzantine Broadcast (BB) is to allow a set of fault-free nodes to agree on information that a source node wants to broadcast to them, in the presence of Byzantine faul...
Guanfeng Liang, Nitin H. Vaidya
FPGA
2004
ACM
174views FPGA» more  FPGA 2004»
15 years 10 months ago
A compiled accelerator for biological cell signaling simulations
The simulation of large systems of biochemical reactions is a key part of research into molecular signaling and information processing in biological cells. However, it can be impr...
John F. Keane, Christopher Bradley, Carl Ebeling
VLDB
1998
ACM
95views Database» more  VLDB 1998»
15 years 9 months ago
RainForest - A Framework for Fast Decision Tree Construction of Large Datasets
Classification of large datasets is an important data mining problem. Many classification algorithms have been proposed in the literature, but studies have shown that so far no al...
Johannes Gehrke, Raghu Ramakrishnan, Venkatesh Gan...