Sciweavers

24680 search results - page 4634 / 4936
» Learning
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 3 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
149
Voted
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
13 years 3 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
RECOMB
2012
Springer
13 years 3 months ago
Estimating the Accuracy of Multiple Alignments and its Use in Parameter Advising
We develop a novel and general approach to estimating the accuracy of protein multiple sequence alignments without knowledge of a reference alignment, and use our approach to addre...
Dan F. DeBlasio, Travis J. Wheeler, John D. Kececi...
138
Voted
TKDE
2012
245views Formal Methods» more  TKDE 2012»
13 years 3 months ago
Semi-Supervised Maximum Margin Clustering with Pairwise Constraints
—The pairwise constraints specifying whether a pair of samples should be grouped together or not have been successfully incorporated into the conventional clustering methods such...
Hong Zeng, Yiu-ming Cheung
SDM
2012
SIAM
282views Data Mining» more  SDM 2012»
13 years 3 months ago
Citation Prediction in Heterogeneous Bibliographic Networks
To reveal information hiding in link space of bibliographical networks, link analysis has been studied from different perspectives in recent years. In this paper, we address a no...
Xiao Yu, Quanquan Gu, Mianwei Zhou, Jiawei Han
« Prev « First page 4634 / 4936 Last » Next »