Sciweavers

16430 search results - page 297 / 3286
» On Computable Tree Functions
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 11 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
99
Voted
STACS
2009
Springer
15 years 11 months ago
A Complexity Dichotomy for Partition Functions with Mixed Signs
Leslie Ann Goldberg, Martin Grohe, Mark Jerrum, Ma...
83
Voted
C5
2008
IEEE
15 years 11 months ago
Navigating Users Based on Estimation of Interest Vectors with Utility Function
Fumiko Harada, Yosuke Nakagawa, Hisashi Ishii, Hir...
HPDC
2006
IEEE
15 years 10 months ago
Service contracts and aggregate utility functions
Alvin AuYoung, Laura Rit, Sohn Wiener, John Wilkes