Sciweavers

2748 search results - page 176 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 1 months ago
Practical learning from one-sided feedback
In many data mining applications, online labeling feedback is only available for examples which were predicted to belong to the positive class. Such applications include spam filt...
D. Sculley
109
Voted
SEFM
2005
IEEE
15 years 6 months ago
Experimental Evaluation of FSM-Based Testing Methods
The development of test cases is an important issue for testing software, communication protocols and other reactive systems. A number of methods are known for the development of ...
Rita Dorofeeva, Nina Yevtushenko, Khaled El-Fakih,...
99
Voted
CVPR
2007
IEEE
16 years 2 months ago
Detailed Human Shape and Pose from Images
Much of the research on video-based human motion capture assumes the body shape is known a priori and is represented coarsely (e.g. using cylinders or superquadrics to model limbs...
Alexandru O. Balan, Leonid Sigal, Michael J. Black...
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
114
Voted
CCS
2008
ACM
15 years 2 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig