Sciweavers

3051 search results - page 528 / 611
» Learning Internal Representations
Sort
View
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
16 years 10 days ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to â€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
138
Voted
WWW
2010
ACM
15 years 10 months ago
Optimal rare query suggestion with implicit user feedback
Query suggestion has been an effective approach to help users narrow down to the information they need. However, most of existing studies focused on only popular/head queries. Si...
Yang Song, Li-wei He
144
Voted
WWW
2010
ACM
15 years 10 months ago
Distributing private data in challenged network environments
Developing countries face signiï¬cant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 10 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
WWW
2010
ACM
15 years 10 months ago
Actively predicting diverse search intent from user browsing behaviors
This paper is concerned with actively predicting search intent from user browsing behavior data. In recent years, great attention has been paid to predicting user search intent. H...
Zhicong Cheng, Bin Gao, Tie-Yan Liu