Sciweavers

3505 search results - page 7 / 701
» Information Theory and the IrisCode
Sort
View
EUROCRYPT
2012
Springer
12 years 12 months ago
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
Decoding random linear codes is a well studied problem with many applications in complexity theory and cryptography. The security of almost all coding and LPN/LWE-based schemes rel...
Anja Becker, Antoine Joux, Alexander May, Alexande...
SOCIALCOM
2010
14 years 7 months ago
A Methodology for Integrating Network Theory and Topic Modeling and its Application to Innovation Diffusion
Text data pertaining to socio-technical networks often are analyzed separately from relational data, or are reduced to the fact and strength of the flow of information between node...
Jana Diesner, Kathleen M. Carley
TMA
2010
Springer
140views Management» more  TMA 2010»
14 years 7 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
IWMM
2011
Springer
217views Hardware» more  IWMM 2011»
14 years 14 days ago
On the theory and potential of LRU-MRU collaborative cache management
The goal of cache management is to maximize data reuse. Collaborative caching provides an interface for software to communicate access information to hardware. In theory, it can o...
Xiaoming Gu, Chen Ding

Presentation
438views
16 years 8 months ago
Games with Incomplete Information
A talk on Nobel Talk by Nobel laureate John C Harsayni, in Topics in Game Theory Course, IISc, November 2008