Sciweavers

1420 search results - page 261 / 284
» Multi-point Constructive Search
Sort
View
TCC
2010
Springer
176views Cryptology» more  TCC 2010»
15 years 10 months ago
Ideal Hierarchical Secret Sharing Schemes
The search of efficient constructions of ideal secret sharing schemes for families of nonthreshold access structures that may have useful applications has attracted a lot of atten...
Oriol Farràs, Carles Padró
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
15 years 8 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns
ATAL
2009
Springer
15 years 8 months ago
Bounded rationality via recursion
Current trends in model construction in the field of agentbased computational economics base behavior of agents on either game theoretic procedures (e.g. belief learning, fictit...
Maciej Latek, Robert L. Axtell, Bogumil Kaminski
133
Voted
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 8 months ago
NUS-WIDE: a real-world web image database from National University of Singapore
This paper introduces a web image dataset created by NUS’s Lab for Media Search. The dataset includes: (1) 269,648 images and the associated tags from Flickr, with a total of 5,...
Tat-Seng Chua, Jinhui Tang, Richang Hong, Haojie L...
GECCO
2009
Springer
15 years 8 months ago
On the performance effects of unbiased module encapsulation
A recent theoretical investigation of modular representations shows that certain modularizations can introduce a distance bias into a landscape. This was a static analysis, and em...
R. Paul Wiegand, Gautham Anil, Ivan I. Garibay, Oz...