Sciweavers

CORR
2012
Springer
162views Education» more  CORR 2012»
12 years 2 days ago
Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
In this paper, we proposed an authentication method according to Diffie-Hellman. First, we introduce different methods for authentication in IEEE.802.16 then we proposed an authen...
Mohammad Zabihi, Ramin Shaghaghi, Mohammad Esmail ...
CORR
2012
Springer
171views Education» more  CORR 2012»
12 years 2 days ago
Random Feature Maps for Dot Product Kernels
Approximating non-linear kernels using feature maps has gained a lot of interest in recent years due to applications in reducing training and testing times of SVM classifiers and...
Purushottam Kar, Harish Karnick
CORR
2012
Springer
204views Education» more  CORR 2012»
12 years 2 days ago
Ontologies for the Integration of Air Quality Models and 3D City Models
In the perspective of a sustainable urban planning, it is necessary to investigate cities in a holistic way and to accept surprises in the response of urban environments to a part...
Claudine Métral, Gilles Falquet, Kostas Kar...
CORR
2012
Springer
184views Education» more  CORR 2012»
12 years 2 days ago
Noisy-OR Models with Latent Confounding
Given a set of experiments in which varying subsets of observed variables are subject to intervention, we consider the problem of identifiability of causal models exhibiting late...
Antti Hyttinen, Frederick Eberhardt, Patrik O. Hoy...
CORR
2012
Springer
224views Education» more  CORR 2012»
12 years 2 days ago
On the Lagrangian Biduality of Sparsity Minimization Problems
We present a novel primal-dual analysis on a class of NPhard sparsity minimization problems to provide new interpretations for their well known convex relaxations. We show that th...
Dheeraj Singaraju, Ehsan Elhamifar, Roberto Tron, ...
CORR
2012
Springer
170views Education» more  CORR 2012»
12 years 2 days ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
CORR
2012
Springer
212views Education» more  CORR 2012»
12 years 2 days ago
Abstracting Runtime Heaps for Program Understanding
Mark Marron, Cesar Sanchez, Zhendong Su, Manuel F&...
CORR
2012
Springer
210views Education» more  CORR 2012»
12 years 2 days ago
Towards minimax policies for online linear optimization with bandit feedback
We address the online linear optimization problem with bandit feedback. Our contribution is twofold. First, we provide an algorithm (based on exponential weights) with a regret of...
Sébastien Bubeck, Nicolò Cesa-Bianch...
CORR
2012
Springer
188views Education» more  CORR 2012»
12 years 2 days ago
Gossip-based Information Spreading in Mobile Networks
Huazi Zhang, Zhaoyang Zhang, Huaiyu Dai
CORR
2012
Springer
173views Education» more  CORR 2012»
12 years 2 days ago
A new approach to the orientation of random hypergraphs
A h-uniform hypergraph H = (V, E) is called ( , k)-orientable if there exists an assignment of each hyperedge e ∈ E to exactly of its vertices v ∈ e such that no vertex is ass...
Marc Lelarge