Sciweavers

4498 search results - page 316 / 900
» How to Invent Functions
Sort
View
152
Voted
CIKM
2008
Springer
15 years 7 months ago
Using English information in non-English web search
The leading web search engines have spent a decade building highly specialized ranking functions for English web pages. One of the reasons these ranking functions are effective is...
Wei Gao, John Blitzer, Ming Zhou
CDC
2008
IEEE
15 years 11 months ago
Convex duality and entropy-based moment closures: Characterizing degenerate densities
A common method for constructing a function from a finite set of moments is to solve a constrained minimization problem. The idea is to find, among all functions with the given ...
Cory D. Hauck, C. David Levermore, André L....
IPPS
2008
IEEE
15 years 11 months ago
Model-based fault localization in large-scale computing systems
We propose a new fault localization technique for software bugs in large-scale computing systems. Our technique always collects per-process function call traces of a target system...
Naoya Maruyama, Satoshi Matsuoka
ISAAC
2005
Springer
127views Algorithms» more  ISAAC 2005»
15 years 10 months ago
Decision Making Based on Approximate and Smoothed Pareto Curves
Abstract. We consider bicriteria optimization problems and investigate the relationship between two standard approaches to solving them: (i) computing the Pareto curve and (ii) the...
Heiner Ackermann, Alantha Newman, Heiko Rögli...
134
Voted
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky