Sciweavers

6047 search results - page 1149 / 1210
» Modeling with Extend
Sort
View
138
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 2 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
ESORICS
2009
Springer
16 years 2 months ago
Dynamic Enforcement of Abstract Separation of Duty Constraints
Separation of Duty Constraints David Basin1 , Samuel J. Burri1,2 , and G?unter Karjoth2 1 ETH Zurich, Department of Computer Science, Switzerland 2 IBM Research, Zurich Research La...
David A. Basin, Günter Karjoth, Samuel J. Bur...
130
Voted
KDD
2007
ACM
197views Data Mining» more  KDD 2007»
16 years 2 months ago
Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming
The kernel function plays a central role in kernel methods. In this paper, we consider the automated learning of the kernel matrix over a convex combination of pre-specified kerne...
Jieping Ye, Shuiwang Ji, Jianhui Chen
KDD
2007
ACM
148views Data Mining» more  KDD 2007»
16 years 2 months ago
Detecting research topics via the correlation between graphs and texts
In this paper we address the problem of detecting topics in large-scale linked document collections. Recently, topic detection has become a very active area of research due to its...
Yookyung Jo, Carl Lagoze, C. Lee Giles
110
Voted
KDD
2005
ACM
137views Data Mining» more  KDD 2005»
16 years 2 months ago
A generalized framework for mining spatio-temporal patterns in scientific data
In this paper, we present a general framework to discover spatial associations and spatio-temporal episodes for scientific datasets. In contrast to previous work in this area, fea...
Hui Yang, Srinivasan Parthasarathy, Sameep Mehta
« Prev « First page 1149 / 1210 Last » Next »