Sciweavers

860 search results - page 118 / 172
» Biased Random Walks
Sort
View
FSE
2006
Springer
174views Cryptology» more  FSE 2006»
15 years 1 months ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar
DMIN
2006
138views Data Mining» more  DMIN 2006»
14 years 11 months ago
Quantification of a Privacy Preserving Data Mining Transformation
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerab...
Mohammed Ketel
IVC
1998
65views more  IVC 1998»
14 years 9 months ago
Segmentation of MR images with intensity inhomogeneities
A statistical model to segment clinical magnetic resonance (MR) images in the presence of noise and intensity inhomogeneities is proposed. Inhomogeneities are considered to be mul...
Jagath C. Rajapakse, Frithjof Kruggel
SOCIALCOM
2010
14 years 7 months ago
Estimating the Size of Online Social Networks
The huge size of online social networks (OSNs) makes it prohibitively expensive to precisely measure any properties which require the knowledge of the entire graph. To estimate the...
Shaozhi Ye, Shyhtsun Felix Wu
WWW
2002
ACM
15 years 10 months ago
The structure of broad topics on the web
The Web graph is a giant social network whose properties have been measured and modeled extensively in recent years. Most such studies concentrate on the graph structure alone, an...
Soumen Chakrabarti, Mukul Joshi, Kunal Punera, Dav...