Sciweavers

8499 search results - page 71 / 1700
» cans 2009
Sort
View
88
Voted
ICAI
2009
14 years 10 months ago
Learning Mappings with Neural Network
The authors extended the idea of training multiple tasks simultaneously on a partially shared feed forward network. A shared input subvector was added to represented common inputs...
Yefei Peng, Paul W. Munro
77
Voted
SPAA
2009
ACM
16 years 1 months ago
Approximation algorithms for time-constrained scheduling on line networks
We consider the problem of time-constrained scheduling of packets in a communication network. Each packet has, in addition to its source and its destination, a release time and a ...
Harald Räcke, Adi Rosén
96
Voted
GBRPR
2009
Springer
15 years 5 months ago
From Random to Hierarchical Data through an Irregular Pyramidal Structure
This paper proposes to transform data scanned randomly in a well-defined space (e.g, Euclidean) along a hierarchical irregular pyramidal structure in an attempt reduce search time...
Rimon Elias, Mohab Al Ashraf, Omar Aly
99
Voted
CANS
2009
Springer
121views Cryptology» more  CANS 2009»
15 years 7 months ago
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
Marc Joye
CANS
2009
Springer
276views Cryptology» more  CANS 2009»
14 years 10 months ago
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model
Group signatures allow users to anonymously sign messages in the name of a group. Membership revocation has always been a critical issue in such systems. In 2004, Boneh and Shacham...
Benoît Libert, Damien Vergnaud