Sciweavers

1980 search results - page 30 / 396
» On the Associative Nijenhuis Relation
Sort
View
EUROCRYPT
2003
Springer
15 years 3 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno
PAAPP
2007
109views more  PAAPP 2007»
14 years 9 months ago
Relation rule mining
\Web users are nowadays confronted with the huge variety of available information sources whose content is not targeted at any specific group or layer. Recommendation systems aim...
Mehdi Adda, Rokia Missaoui, Petko Valtchev
POPL
2004
ACM
15 years 10 months ago
Simple relational correctness proofs for static analyses and program transformations
We show how some classical static analyses for imperative programs, and the optimizing transformations which they enable, may be expressed and proved correct using elementary logi...
Nick Benton
CIKM
2010
Springer
14 years 8 months ago
Ranking related entities: components and analyses
Related entity finding is the task of returning a ranked list of homepages of relevant entities of a specified type that need to engage in a given relationship with a given sour...
Marc Bron, Krisztian Balog, Maarten de Rijke
PODS
2005
ACM
85views Database» more  PODS 2005»
15 years 10 months ago
Relative risk and odds ratio: a data mining perspective
We are often interested to test whether a given cause has a given effect. If we cannot specify the nature of the factors involved, such tests are called model-free studies. There ...
Haiquan Li, Jinyan Li, Limsoon Wong, Mengling Feng...