Sciweavers

3378 search results - page 603 / 676
» Learning in Friedberg Numberings
Sort
View
EUROCRYPT
2003
Springer
15 years 7 months ago
Two-Threshold Broadcast and Detectable Multi-party Computation
Classical distributed protocols like broadcast or multi-party computation provide security as long as the number of malicious players f is bounded by some given threshold t, i.e., ...
Matthias Fitzi, Martin Hirt, Thomas Holenstein, J&...
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
15 years 7 months ago
Using Genetic Algorithms for Data Mining Optimization in an Educational Web-Based System
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...
Behrouz Minaei-Bidgoli, William F. Punch
ECML
2001
Springer
15 years 6 months ago
Classification on Data with Biased Class Distribution
Labeled data for classification could often be obtained by sampling that restricts or favors choice of certain classes. A classifier trained using such data will be biased, resulti...
Slobodan Vucetic, Zoran Obradovic
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 6 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
CRYPTO
2000
Springer
149views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
A Cryptographic Solution to a Game Theoretic Problem
In this work we use cryptography to solve a game-theoretic problem which arises naturally in the area of two party strategic games. The standard game-theoretic solution concept for...
Yevgeniy Dodis, Shai Halevi, Tal Rabin