Sciweavers

9886 search results - page 1938 / 1978
» Learning Compressible Models
Sort
View
CGO
2010
IEEE
15 years 6 months ago
Exploiting statistical correlations for proactive prediction of program behaviors
This paper presents a finding and a technique on program behavior prediction. The finding is that surprisingly strong statistical correlations exist among the behaviors of diffe...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Feng Mao, ...
ETRA
2010
ACM
197views Biometrics» more  ETRA 2010»
15 years 6 months ago
Image ranking with implicit feedback from eye movements
In order to help users navigate an image search system, one could provide explicit information on a small set of images as to which of them are relevant or not to their task. Thes...
David R. Hardoon, Kitsuchart Pasupa
IUI
2009
ACM
15 years 6 months ago
Discovering frequent work procedures from resource connections
Intelligent desktop assistants could provide more help for users if they could learn models of the users’ workflows. However, discovering desktop workflows is difficult becau...
Jianqiang Shen, Erin Fitzhenry, Thomas G. Dietteri...
SAC
2009
ACM
15 years 6 months ago
LEGAL-tree: a lexicographic multi-objective genetic algorithm for decision tree induction
Decision trees are widely disseminated as an effective solution for classification tasks. Decision tree induction algorithms have some limitations though, due to the typical strat...
Márcio P. Basgalupp, Rodrigo C. Barros, And...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
« Prev « First page 1938 / 1978 Last » Next »