Sciweavers

3055 search results - page 378 / 611
» Randomized Search Trees
Sort
View
152
Voted
PKDD
2007
Springer
141views Data Mining» more  PKDD 2007»
15 years 10 months ago
Automatic Hidden Web Database Classification
In this paper, a method for automatic classification of Hidden-Web databases is addressed. In our approach, the classification tree for Hidden Web databases is constructed by tailo...
Zhiguo Gong, Jingbai Zhang, Qian Liu
EUROCRYPT
2003
Springer
15 years 9 months ago
A Forward-Secure Public-Key Encryption Scheme
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the...
Ran Canetti, Shai Halevi, Jonathan Katz
AINA
2010
IEEE
15 years 8 months ago
The Power of Orientation in Symmetry-Breaking
—Symmetry breaking is a fundamental operation in distributed computing. It has applications to important problems such as graph vertex and edge coloring, maximal independent sets...
Satya Krishna Pindiproli, Kishore Kothapalli
GECCO
2000
Springer
200views Optimization» more  GECCO 2000»
15 years 7 months ago
Chemical Crossover
During chemical reactions, molecules interact to produce new molecules. Some of the reaction mechanisms are very close to the way gene combine to produce new genes. Like the class...
Hugues Bersini
ICONIP
2008
15 years 5 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...