Sciweavers

319 search results - page 40 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
CORR
2011
Springer
168views Education» more  CORR 2011»
14 years 4 months ago
Limit Theorems for the Sample Entropy of Hidden Markov Chains
The Shannon-McMillan-Breiman theorem asserts that the sample entropy of a stationary and ergodic stochastic process converges to the entropy rate of the same process almost surely...
Guangyue Han
ACG
2009
Springer
15 years 4 months ago
Solving Kriegspiel Endings with Brute Force: The Case of KR vs. K
Retrograde analysis is a tool for reconstructing a game tree starting from its leaves; with these techniques one can solve specific subsets of a complex game, achieving optimal pl...
Paolo Ciancarini, Gian Piero Favini
VTC
2007
IEEE
15 years 3 months ago
Optimum Tree-Based Topologies for Multi-Sink Wireless Sensor Networks Using IEEE 802.15.4
— This paper investigates the topology formation mechanisms provided by IEEE 802.15.4 to create tree-based topologies, in the context of a multi-sink wireless sensor network. The...
Chiara Buratti, Francesca Cuomo, Sara Della Luna, ...
SEKE
2007
Springer
15 years 3 months ago
Query Processing in Paraconsistent Databases in the Presence of Integrity Constraints
In this paper, we present an approach to query processing for paraconsistent databases in the presence of integrity constraints. Paraconsistent databases are capable of representi...
Navin Viswanath, Rajshekhar Sunderraman
ICDM
2006
IEEE
119views Data Mining» more  ICDM 2006»
15 years 3 months ago
Direct Marketing When There Are Voluntary Buyers
1 In traditional direct marketing, the implicit assumption is that customers will only purchase the product if they are contacted. In real business environments, however, there ar...
Yi-Ting Lai, Ke Wang, Daymond Ling, Hua Shi, Jason...