Sciweavers

429 search results - page 57 / 86
» Permutative Additives and Exponentials
Sort
View
JCDL
2005
ACM
84views Education» more  JCDL 2005»
15 years 10 months ago
Finding a catalog: generating analytical catalog records from well-structured digital texts
One of the criticisms library users often make of catalogs is that they rarely include information below the bibliographic level. It is generally impossible to search a catalog fo...
David M. Mimno, Alison Jones, Gregory Crane
127
Voted
SPAA
2005
ACM
15 years 10 months ago
Concurrent cache-oblivious b-trees
This paper presents concurrent cache-oblivious (CO) B-trees. We extend the cache-oblivious model to a parallel or distributed setting and present three concurrent CO B-trees. Our ...
Michael A. Bender, Jeremy T. Fineman, Seth Gilbert...
154
Voted
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
15 years 10 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
151
Voted
CD
2005
Springer
15 years 10 months ago
Improving Availability in Large, Distributed Component-Based Systems Via Redeployment
In distributed and mobile environments, the connections among the hosts on which a software system is running are often unstable. As a result of connectivity losses, the overall av...
Marija Mikic-Rakic, Sam Malek, Nenad Medvidovic
161
Voted
COLT
2005
Springer
15 years 10 months ago
Leaving the Span
We discuss a simple sparse linear problem that is hard to learn with any algorithm that uses a linear combination of the training instances as its weight vector. The hardness holds...
Manfred K. Warmuth, S. V. N. Vishwanathan