-
1
-
-
12244261880
-
Cross channel optimized marketing by reinforcement learning
-
Abe, N., Verma, N., Apte, C., & Schroko, R. (2004). Cross channel optimized marketing by reinforcement learning. ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining (pp. 767-772).
-
(2004)
ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining
, pp. 767-772
-
-
Abe, N.1
Verma, N.2
Apte, C.3
Schroko, R.4
-
2
-
-
33748784614
-
An Approximate Dynamic Programming Approach to Decentralized Control of Stochastic Systems
-
Cogill, R., Rotkowitz, M., Van Roy, B., & Lall, S. (2006). An Approximate Dynamic Programming Approach to Decentralized Control of Stochastic Systems. LNCIS, 329, 243-256.
-
(2006)
LNCIS
, vol.329
, pp. 243-256
-
-
Cogill, R.1
Rotkowitz, M.2
Van Roy, B.3
Lall, S.4
-
3
-
-
0002908662
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Springer
-
Dåmgard, I., & Jurik, M. (2001). A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Public Key Cryptography 2001. Springer.
-
(2001)
Public Key Cryptography 2001
-
-
Dåmgard, I.1
Jurik, M.2
-
4
-
-
33847417976
-
Privacy-preserving boosting
-
Gambs, S., Kégl, B., & Aïmeur, E. (2007). Privacy-preserving boosting. Data Mining and Knowledge Discovery, 14, 131-170.
-
(2007)
Data Mining and Knowledge Discovery
, vol.14
, pp. 131-170
-
-
Gambs, S.1
Kégl, B.2
Aïmeur, E.3
-
5
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press
-
Goldreich, O. (2004). Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press.
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
7
-
-
56449120572
-
Privacy-Preserving Belief Propagation and Sampling
-
Kearns, M., Tan, J., & Wortman, J. (2007). Privacy-Preserving Belief Propagation and Sampling. NIPS 20.
-
(2007)
NIPS 20
-
-
Kearns, M.1
Tan, J.2
Wortman, J.3
-
8
-
-
33746437508
-
Privacy Preserving Data Mining
-
Lindell, Y., & Pinkas, B. (2002). Privacy Preserving Data Mining. Journal of Cryptology, 15, 177-206.
-
(2002)
Journal of Cryptology
, vol.15
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
9
-
-
85084163840
-
Fairplay: A secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., & Sella, Y. (2004). Fairplay: a secure two-party computation system. USENIX Security Symposium (pp. 287-302).
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
10
-
-
33746360402
-
Distributed optimization in adaptive networks
-
Moallemi, C. C., & Roy, B. V. (2004). Distributed optimization in adaptive networks. NIPS 16.
-
(2004)
NIPS 16
-
-
Moallemi, C.C.1
Roy, B.V.2
-
12
-
-
0001395498
-
Distributed value functions
-
Schneider, J., Wong, W., Moore, A., & Riedmiller, M. (1999). Distributed value functions. Int'l Conf. on Machine Learning (pp. 371-378).
-
(1999)
Int'l Conf. on Machine Learning
, pp. 371-378
-
-
Schneider, J.1
Wong, W.2
Moore, A.3
Riedmiller, M.4
-
16
-
-
33751023839
-
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
-
Yu, H., Jiang, X., & Vaidya, J. (2006). Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. ACM SAC (pp. 603-610).
-
(2006)
ACM SAC
, pp. 603-610
-
-
Yu, H.1
Jiang, X.2
Vaidya, J.3
-
17
-
-
33644513699
-
Privacy preserving learning in negotiation
-
Zhang, S., & Makedon, F. (2005). Privacy preserving learning in negotiation. ACM SAC (pp. 821-825).
-
(2005)
ACM SAC
, pp. 821-825
-
-
Zhang, S.1
Makedon, F.2
|