Sciweavers

5123 search results - page 958 / 1025
» Performance and Security Tradeoff
Sort
View
CSDA
2007
120views more  CSDA 2007»
14 years 10 months ago
Boosting ridge regression
Ridge regression is a well established method to shrink regression parameters towards zero, thereby securing existence of estimates. The present paper investigates several approac...
Gerhard Tutz, Harald Binder
JMLR
2008
148views more  JMLR 2008»
14 years 10 months ago
Linear-Time Computation of Similarity Measures for Sequential Data
Efficient and expressive comparison of sequences is an essential procedure for learning with sequential data. In this article we propose a generic framework for computation of sim...
Konrad Rieck, Pavel Laskov
JSW
2008
127views more  JSW 2008»
14 years 10 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
JTAER
2008
103views more  JTAER 2008»
14 years 10 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu
73
Voted
ECRA
2007
113views more  ECRA 2007»
14 years 10 months ago
Exclusions and related trust relationships in multi-party fair exchange protocols
Some electronic commerce transactions are inherently performed between more than two parties. In this context, it is thus important to determine whether the underlying fair exchan...
Nicolás González-Deleito, Olivier Ma...