Sciweavers

11752 search results - page 2339 / 2351
» Those
Sort
View
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
13 years 16 hour ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
13 years 14 hour ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su
KDD
2012
ACM
247views Data Mining» more  KDD 2012»
13 years 13 hour ago
Integrating meta-path selection with user-guided object clustering in heterogeneous information networks
Real-world, multiple-typed objects are often interconnected, forming heterogeneous information networks. A major challenge for link-based clustering in such networks is its potent...
Yizhou Sun, Brandon Norick, Jiawei Han, Xifeng Yan...
SIGIR
2012
ACM
13 years 12 hour ago
Cognos: crowdsourcing search for topic experts in microblogs
Finding topic experts on microblogging sites with millions of users, such as Twitter, is a hard and challenging problem. In this paper, we propose and investigate a new methodolog...
Saptarshi Ghosh, Naveen Kumar Sharma, Fabrí...
ECOOP
2012
Springer
13 years 10 hour ago
Static Detection of Loop-Invariant Data Structures
As a culture, object-orientation encourages programmers to create objects, both short- and long-lived, without concern for cost. Excessive object creation and initialization can ca...
Guoqing (Harry) Xu, Dacong Yan, Atanas Rountev
« Prev « First page 2339 / 2351 Last » Next »