Sciweavers

29908 search results - page 5965 / 5982
» On the Complexity of
Sort
View
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
13 years 2 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
121
Voted
ISSTA
2012
ACM
13 years 2 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
149
Voted
PAMI
2012
13 years 2 months ago
Recursive Segmentation and Recognition Templates for Image Parsing
— Language and image understanding are two major goals of artificial intelligence which can both be conceptually formulated in terms of parsing the input signal into a hierarchi...
Long Zhu, Yuanhao Chen, Yuan Lin, Chenxi Lin, Alan...
SIGIR
2012
ACM
13 years 2 months ago
Explanatory semantic relatedness and explicit spatialization for exploratory search
Exploratory search, in which a user investigates complex concepts, is cumbersome with today’s search engines. We present a new exploratory search approach that generates interac...
Brent Hecht, Samuel Carton, Mahmood Quaderi, Johan...
110
Voted
SIGIR
2012
ACM
13 years 2 months ago
TFMAP: optimizing MAP for top-n context-aware recommendation
In this paper, we tackle the problem of top-N context-aware recommendation for implicit feedback scenarios. We frame this challenge as a ranking problem in collaborative filterin...
Yue Shi, Alexandros Karatzoglou, Linas Baltrunas, ...
« Prev « First page 5965 / 5982 Last » Next »