Sciweavers

854 search results - page 158 / 171
» Abstracting from Failure Probabilities
Sort
View
ICMLA
2009
14 years 9 months ago
Regularizing the Local Similarity Discriminant Analysis Classifier
Abstract--We investigate parameter-based and distributionbased approaches to regularizing the generative, similarity-based classifier called local similarity discriminant analysis ...
Luca Cazzanti, Maya R. Gupta
JOC
2010
123views more  JOC 2010»
14 years 6 months ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
INFOCOM
2008
IEEE
15 years 6 months ago
Index Policies for Real-Time Multicast Scheduling for Wireless Broadcast Systems
Abstract—Motivated by the increasing usage of wireless broadcast networks for multicast real-time applications like video, this paper considers a canonical real-time multicast sc...
Vivek Raghunathan, Vivek S. Borkar, Min Cao, P. R....
ICC
2007
IEEE
387views Communications» more  ICC 2007»
15 years 6 months ago
LS Channel Estimation for Mobile OFDM Communications on Time-Varying Frequency-Selective Fading Channels
Abstract— A least-squares (LS) channel estimation (CE) technique for mobile OFDM communications over a rapidly timevarying frequency-selective fading channel is investigated in t...
Jia-Chin Lin
PET
2005
Springer
15 years 5 months ago
Anonymity Preserving Techniques in Trust Negotiations
Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attrib...
Indrakshi Ray, Elisa Bertino, Anna Cinzia Squiccia...