Sciweavers

571 search results - page 46 / 115
» Performing causality analysis by bounded model checking
Sort
View
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
JMLR
2010
179views more  JMLR 2010»
14 years 6 months ago
PAC-Bayesian Analysis of Co-clustering and Beyond
We derive PAC-Bayesian generalization bounds for supervised and unsupervised learning models based on clustering, such as co-clustering, matrix tri-factorization, graphical models...
Yevgeny Seldin, Naftali Tishby
DBSEC
2010
196views Database» more  DBSEC 2010»
14 years 8 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
RTAS
2007
IEEE
15 years 6 months ago
A Programming Model for Time-Synchronized Distributed Real-Time Systems
Discrete-event (DE) models are formal system specifications that have analyzable deterministic behaviors. Using a global, consistent notion of time, DE components communicate via...
Yang Zhao, Jie Liu, Edward A. Lee
ICA
2010
Springer
15 years 28 days ago
Use of Prior Knowledge in a Non-Gaussian Method for Learning Linear Structural Equation Models
Abstract. We discuss causal structure learning based on linear structural equation models. Conventional learning methods most often assume Gaussianity and create many indistinguish...
Takanori Inazumi, Shohei Shimizu, Takashi Washio