Sciweavers

6650 search results - page 1240 / 1330
» models 2009
Sort
View
135
Voted
KDD
2009
ACM
262views Data Mining» more  KDD 2009»
16 years 1 months ago
Sentiment analysis of blogs by combining lexical knowledge with text classification
The explosion of user-generated content on the Web has led to new opportunities and significant challenges for companies, that are increasingly concerned about monitoring the disc...
Prem Melville, Wojciech Gryc, Richard D. Lawrence
COSIT
2009
Springer
116views GIS» more  COSIT 2009»
15 years 7 months ago
The Endpoint Hypothesis: A Topological-Cognitive Assessment of Geographic Scale Movement Patterns
Movement patterns of individual entities at the geographic scale are becoming a prominent research focus in spatial sciences. One pertinent question is how cognitive and formal cha...
Alexander Klippel, Rui Li
116
Voted
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
16 years 1 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
117
Voted
EMSOFT
2009
Springer
15 years 4 months ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
FSE
2009
Springer
118views Cryptology» more  FSE 2009»
16 years 1 months ago
Enhanced Target Collision Resistant Hash Functions Revisited
Enhanced Target Collision Resistance (eTCR) property for a hash function was put forth by Halevi and Krawczyk in Crypto 2006, in conjunction with the randomized hashing mode that i...
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
« Prev « First page 1240 / 1330 Last » Next »