Sciweavers

4930 search results - page 819 / 986
» Learning minimal abstractions
Sort
View
120
Voted
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
97
Voted
RSFDGRC
2005
Springer
192views Data Mining» more  RSFDGRC 2005»
15 years 6 months ago
An Open Source Microarray Data Analysis System with GUI: Quintet
We address Quintet, an R-based unified cDNA microarray data analysis system with GUI. Five principal categories of microarray data analysis have been coherently integrated in Quin...
Jun-kyoung Choe, Tae-Hoon Chung, Sunyong Park, Hwa...
98
Voted
COLT
2004
Springer
15 years 6 months ago
Online Geometric Optimization in the Bandit Setting Against an Adaptive Adversary
We give an algorithm for the bandit version of a very general online optimization problem considered by Kalai and Vempala [1], for the case of an adaptive adversary. In this proble...
H. Brendan McMahan, Avrim Blum
ISCC
2003
IEEE
15 years 6 months ago
Fair Noiseless Broadcast Source Coding
We present a noiseless source coding problem in a broadcast environment and supply a simple solution to this problem. A transmitter wishes to transmit a binary random vector Ò ½...
Serdar Boztas
87
Voted
ATAL
2003
Springer
15 years 6 months ago
Providing Effective Access to Shared Resources: A COIN Approach
Managers of systems of shared resources typically have many separate goals. Examples are efficient utilization of the resources among its users and ensuring no user’s satisfacti...
Stéphane Airiau, Sandip Sen, David Wolpert,...