Sciweavers

2139 search results - page 225 / 428
» Distributed computing and computer security education
Sort
View
105
Voted
CORR
2008
Springer
116views Education» more  CORR 2008»
15 years 3 months ago
To which extend is the "neural code" a metric ?
Here is proposed a review of the different choices to structure spike trains, using deterministic metrics. Temporal constraints observed in biological or computational spike train...
Bruno Cessac, Horacio Rostro-González, Juan...
95
Voted
CORR
2011
Springer
153views Education» more  CORR 2011»
14 years 10 months ago
Partially Linear Bayesian Estimation with Application to Sparse Approximations
—We address the problem of estimating a random vector X from two sets of measurements Y and Z, such that the estimator is linear in Y . We show that the partially linear minimum ...
Tomer Michaeli, Daniel Sigalov, Yonina C. Eldar
154
Voted
CORR
2008
Springer
142views Education» more  CORR 2008»
15 years 3 months ago
A Gaussian Belief Propagation Solver for Large Scale Support Vector Machines
Support vector machines (SVMs) are an extremely successful type of classification and regression algorithms. Building an SVM entails solving a constrained convex quadratic program...
Danny Bickson, Elad Yom-Tov, Danny Dolev
137
Voted
WETICE
1997
IEEE
15 years 7 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
145
Voted
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 7 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner