Sciweavers

817 search results - page 110 / 164
» On 2-factors with k components
Sort
View
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
15 years 3 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
ICWL
2005
Springer
15 years 3 months ago
Grounding Collaborative Knowledge Building in Semantics-Based Critiquing
In this paper we investigate the use of Latent Semantic Analysis (LSA), Critiquing Systems, and Knowledge Building to support computerbased teaching of English composition. We have...
Anders I. Mørch, William K. Cheung, Kelvin ...
ISAAC
2005
Springer
138views Algorithms» more  ISAAC 2005»
15 years 3 months ago
On the Complexity of Rocchio's Similarity-Based Relevance Feedback Algorithm
In this paper, we prove for the first time that the learning complexity of Rocchio’s algorithm is O(d+d2 (log d+log n)) over the discretized vector space {0, . . . , n − 1}d ,...
Zhixiang Chen, Bin Fu
WEBI
2005
Springer
15 years 3 months ago
Integrating Element and Term Semantics for Similarity-Based XML Document Clustering
Structured link vector model (SLVM) is a recently proposed document representation that takes into account both structural and semantic information for measuring XML document simi...
Jianwu Yang, William K. Cheung, Xiaoou Chen
PEWASUN
2004
ACM
15 years 3 months ago
A simulation study on multi-rate mobile ad hoc networks
This paper studies the performance of a multi-rate mobile ad hoc network (MANET) using an extended ns-2 simulator. A link adaptation algorithm is developed and tested. The multi-r...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava