Sciweavers

9888 search results - page 1893 / 1978
» compute 2009
Sort
View
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 1 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
122
Voted
KDD
2009
ACM
219views Data Mining» more  KDD 2009»
16 years 1 months ago
Structured correspondence topic models for mining captioned figures in biological literature
A major source of information (often the most crucial and informative part) in scholarly articles from scientific journals, proceedings and books are the figures that directly pro...
Amr Ahmed, Eric P. Xing, William W. Cohen, Robert ...
106
Voted
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 1 months ago
Turning down the noise in the blogosphere
In recent years, the blogosphere has experienced a substantial increase in the number of posts published daily, forcing users to cope with information overload. The task of guidin...
Khalid El-Arini, Gaurav Veda, Dafna Shahaf, Carlos...
KDD
2009
ACM
215views Data Mining» more  KDD 2009»
16 years 1 months ago
Large-scale sparse logistic regression
Logistic Regression is a well-known classification method that has been used widely in many applications of data mining, machine learning, computer vision, and bioinformatics. Spa...
Jun Liu, Jianhui Chen, Jieping Ye
KDD
2009
ACM
239views Data Mining» more  KDD 2009»
16 years 1 months ago
Tell me something I don't know: randomization strategies for iterative data mining
There is a wide variety of data mining methods available, and it is generally useful in exploratory data analysis to use many different methods for the same dataset. This, however...
Heikki Mannila, Kai Puolamäki, Markus Ojala, ...
« Prev « First page 1893 / 1978 Last » Next »