Sciweavers

2154 search results - page 127 / 431
» On the notion of concept I
Sort
View
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 8 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
ICML
2000
IEEE
15 years 10 months ago
Version Space Algebra and its Application to Programming by Demonstration
Machine learning research has been very successful at producing powerful, broadlyapplicable classification learners. However, many practical learning problems do not fit the class...
Tessa A. Lau, Pedro Domingos, Daniel S. Weld
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
15 years 10 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu
LICS
2009
IEEE
15 years 4 months ago
Trace Semantics is Fully Abstract
mantics Is Fully Abstract∗ Sumit Nain and Moshe Y. Vardi Rice University, Department of Computer Science Houston, TX 77005-1892, USA The discussion in the computer-science liter...
Sumit Nain, Moshe Y. Vardi
EUROGP
2009
Springer
108views Optimization» more  EUROGP 2009»
15 years 4 months ago
Why Coevolution Doesn't "Work": Superiority and Progress in Coevolution
Coevolution often gives rise to counter-intuitive dynamics that defy our expectations. Here we suggest that much of the confusion surrounding coevolution results from imprecise not...
Thomas Miconi