Sciweavers

16843 search results - page 3266 / 3369
» On Generalized Authorization Problems
Sort
View
107
Voted
IIR
2010
15 years 2 months ago
An IR-Based Approach for Tag Recommendation
Thanks to the continuous growth of collaborative platforms like YouTube, Flickr and Delicious, we are recently witnessing to a rapid evolution of web dynamics towards a more `soci...
Cataldo Musto, Fedelucio Narducci, Marco de Gemmis...
98
Voted
DAGSTUHL
2007
15 years 2 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois
88
Voted
DGO
2008
126views Education» more  DGO 2008»
15 years 2 months ago
Active learning for e-rulemaking: public comment categorization
We address the e-rulemaking problem of reducing the manual labor required to analyze public comment sets. In current and previous work, for example, text categorization techniques...
Stephen Purpura, Claire Cardie, Jesse Simons
ESANN
2007
15 years 2 months ago
How to process uncertainty in machine learning?
Uncertainty is a popular phenomenon in machine learning and a variety of methods to model uncertainty at different levels has been developed. The aim of this paper is to motivate ...
Barbara Hammer, Thomas Villmann
115
Voted
FIW
2007
152views Communications» more  FIW 2007»
15 years 2 months ago
Considering Safety and Feature Interactions for Integrated Services of Home Network System
Assuring safety in the home network system (HNS) is a crucial issue to guarantee high quality of life. In this position paper, we first review our previous work, formulating three...
Ben Yan
« Prev « First page 3266 / 3369 Last » Next »