Sciweavers

14165 search results - page 2722 / 2833
» The generalized two-server problem
Sort
View
SIGIR
2010
ACM
15 years 8 months ago
Positional relevance model for pseudo-relevance feedback
Pseudo-relevance feedback is an effective technique for improving retrieval results. Traditional feedback algorithms use a whole feedback document as a unit to extract words for ...
Yuanhua Lv, ChengXiang Zhai
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
15 years 8 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
150
Voted
SOUPS
2010
ACM
15 years 8 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 8 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
GECCO
2007
Springer
212views Optimization» more  GECCO 2007»
15 years 8 months ago
Controlling overfitting with multi-objective support vector machines
Recently, evolutionary computation has been successfully integrated into statistical learning methods. A Support Vector Machine (SVM) using evolution strategies for its optimizati...
Ingo Mierswa
« Prev « First page 2722 / 2833 Last » Next »