Sciweavers

4555 search results - page 404 / 911
» Deductive Algorithmic Knowledge
Sort
View
NETWORKS
2007
15 years 3 months ago
Incremental flow
This paper defines an incremental version of the maximum flow problem. In this model, the capacities increase over time and the resulting solution is a sequence of flows that b...
Jeff Hartline, Alexa Sharp
ICASSP
2010
IEEE
15 years 2 months ago
Identification of linear systems in canonical form through an EM framework
Least-squares estimation has always been the main approach when applying prediction error methods (PEM) in the identification of linear dynamical systems. Regardless of the estim...
Pavlos Papadopoulos, Vassilis Digalakis
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
15 years 2 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
AND
2010
15 years 2 months ago
Discovering users' topics of interest on twitter: a first look
Twitter, a micro-blogging service, provides users with a framework for writing brief, often-noisy postings about their lives. These posts are called "Tweets." In this pa...
Matthew Michelson, Sofus A. Macskassy
CIKM
2010
Springer
15 years 2 months ago
Anonymizing data with quasi-sensitive attribute values
We study the problem of anonymizing data with quasi-sensitive attributes. Quasi-sensitive attributes are not sensitive by themselves, but certain values or their combinations may ...
Pu Shi, Li Xiong, Benjamin C. M. Fung