Sciweavers

9886 search results - page 1775 / 1978
» Learning Compressible Models
Sort
View
ASIACRYPT
2009
Springer
15 years 11 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
CAISE
2009
Springer
15 years 11 months ago
TomTom for Business Process Management (TomTom4BPM)
Navigation systems have proven to be quite useful for many drivers. People increasingly rely on the devices of TomTom and other vendors and find it useful to get directions to go ...
Wil M. P. van der Aalst
LORI
2009
Springer
15 years 10 months ago
Dynamic Testimonial Logic
We propose a dynamic testimonial logic (DTL) to model communication and belief change among agents with different dispositions to trust each other as information sources. DTL is ...
Wesley H. Holliday
MIR
2010
ACM
264views Multimedia» more  MIR 2010»
15 years 10 months ago
Quest for relevant tags using local interaction networks and visual content
Typical tag recommendation systems for photos shared on social networks such as Flickr, use visual content analysis, collaborative filtering or personalization strategies to prod...
Neela Sawant, Ritendra Datta, Jia Li, James Ze Wan...
BIBE
2008
IEEE
160views Bioinformatics» more  BIBE 2008»
15 years 10 months ago
Parallel integration of heterogeneous genome-wide data sources
— Heterogeneous genome-wide data sources capture information on various aspects of complex biological systems. For instance, transcriptome, interactome and phenome-level informat...
Derek Greene, Kenneth Bryan, Padraig Cunningham
« Prev « First page 1775 / 1978 Last » Next »