Sciweavers

970 search results - page 185 / 194
» On the relation between multi-instance learning and semi-sup...
Sort
View
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
15 years 3 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
IJCNN
2006
IEEE
15 years 3 months ago
An optimization approach to achieve unsupervised segmentation and binding in a dynamical network
— We present a novel network of oscillatory units, whose behavior is described by the amplitude and phase of oscillations. While building on previous work, the system presented i...
A. Ravishankar Rao, Guillermo A. Cecchi, Charles C...
JCDL
2006
ACM
151views Education» more  JCDL 2006»
15 years 3 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber
101
Voted
INFOCOM
2005
IEEE
15 years 3 months ago
A performance vs. cost framework for evaluating DHT design tradeoffs under churn
Abstract— Protocols for distributed hash tables (DHTs) incorporate features to achieve low latency for lookup requests in the face of churn, continuous changes in membership. The...
Jinyang Li, Jeremy Stribling, Robert Morris, M. Fr...
IUI
2005
ACM
15 years 3 months ago
Improving proactive information systems
Proactive contextual information systems help people locate information by automatically suggesting potentially relevant resources based on their current tasks or interests. Such ...
Daniel Billsus, David M. Hilbert, Dan Maynes-Aminz...