Sciweavers

1652 search results - page 127 / 331
» Matching Vector Codes
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
TAMC
2007
Springer
15 years 5 months ago
On Deciding Deep Holes of Reed-Solomon Codes
For generalized Reed-Solomon codes, it has been proved [7] that the problem of determining if a received word is a deep hole is coNP-complete. The reduction relies on the fact that...
Qi Cheng, Elizabeth Murray
PAKDD
2005
ACM
102views Data Mining» more  PAKDD 2005»
15 years 5 months ago
Automatic Occupation Coding with Combination of Machine Learning and Hand-Crafted Rules
Abstract. We apply a machine learning method to the occupation coding, which is a task to categorize the answers to open-ended questions regarding the respondent’s occupation. Sp...
Kazuko Takahashi, Hiroya Takamura, Manabu Okumura
CORR
2011
Springer
178views Education» more  CORR 2011»
14 years 6 months ago
Anytime Reliable Codes for Stabilizing Plants over Erasure Channels
—The problem of stabilizing an unstable plant over a noisy communication link is an increasingly important one that arises in problems of distributed control and networked contro...
Ravi Teja Sukhavasi, Babak Hassibi
TSE
2002
99views more  TSE 2002»
14 years 11 months ago
Recovering Traceability Links between Code and Documentation
Software system documentation is almost always expressed informally in natural language and free text. Examples include requirement specifications, design documents, manual pages, ...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...