Sciweavers

1363 search results - page 238 / 273
» On some Relations between Dynamical Systems and Transition S...
Sort
View
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 2 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
IWCMC
2010
ACM
14 years 11 months ago
On the use of random neural networks for traffic matrix estimation in large-scale IP networks
Despite a large body of literature and methods devoted to the Traffic Matrix (TM) estimation problem, the inference of traffic flows volume from aggregated data still represents a ...
Pedro Casas, Sandrine Vaton
PE
2002
Springer
107views Optimization» more  PE 2002»
14 years 9 months ago
Multi-path continuous media streaming: what are the benefits?
Quality of service (QoS) in delivery of continuous media (CM) over the Internet is still relatively poor and inconsistent. Although many such applications can tolerate some degree...
Leana Golubchik, John C. S. Lui, Tak Fu Tung, Alix...
WWW
2007
ACM
15 years 10 months ago
Hierarchical, perceptron-like learning for ontology-based information extraction
Recent work on ontology-based Information Extraction (IE) has tried to make use of knowledge from the target ontology in order to improve semantic annotation results. However, ver...
Yaoyong Li, Kalina Bontcheva
SUM
2009
Springer
15 years 4 months ago
Modeling Unreliable Observations in Bayesian Networks by Credal Networks
Bayesian networks are probabilistic graphical models widely employed in AI for the implementation of knowledge-based systems. Standard inference algorithms can update the beliefs a...
Alessandro Antonucci, Alberto Piatti