Sciweavers

6393 search results - page 1104 / 1279
» Randomized Algorithms on the Mesh
Sort
View
EUROCRYPT
2009
Springer
16 years 4 months ago
Order-Preserving Symmetric Encryption
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a primitive suggested in the database community by Agrawal et al. (SIGMOD '04) for allowin...
Alexandra Boldyreva, Nathan Chenette, Younho Lee, ...
132
Voted
CAV
2009
Springer
187views Hardware» more  CAV 2009»
16 years 4 months ago
A Markov Chain Monte Carlo Sampler for Mixed Boolean/Integer Constraints
We describe a Markov chain Monte Carlo (MCMC)-based algorithm for sampling solutions to mixed Boolean/integer constraint problems. The focus of this work differs in two points from...
Nathan Kitchen, Andreas Kuehlmann
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 4 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
16 years 4 months ago
Bypass rates: reducing query abandonment using negative inferences
We introduce a new approach to analyzing click logs by examining both the documents that are clicked and those that are bypassed--documents returned higher in the ordering of the ...
Atish Das Sarma, Sreenivas Gollapudi, Samuel Ieong
134
Voted
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
16 years 4 months ago
Active exploration for learning rankings from clickthrough data
We address the task of learning rankings of documents from search engine logs of user behavior. Previous work on this problem has relied on passively collected clickthrough data. ...
Filip Radlinski, Thorsten Joachims
« Prev « First page 1104 / 1279 Last » Next »