Sciweavers

1696 search results - page 125 / 340
» Permuted function matching
Sort
View
152
Voted
NIPS
1997
15 years 4 months ago
Relative Loss Bounds for Multidimensional Regression Problems
We study on-line generalized linear regression with multidimensional outputs, i.e., neural networks with multiple output nodes but no hidden nodes. We allow at the final layer tra...
Jyrki Kivinen, Manfred K. Warmuth
111
Voted
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 6 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
101
Voted
AUSAI
2007
Springer
15 years 8 months ago
The Detrimentality of Crossover
The traditional concept of a genetic algorithm (GA) is that of selection, crossover and mutation. However, a limited amount of data from the literature has suggested that the nich...
Andrew Czarn, Cara MacNish, Kaipillil Vijayan, Ber...
199
Voted

Book
594views
17 years 19 days ago
A Gentle Introduction to Haskell
The book covers the following topics: Values, Types, Functions, Case Expressions and Pattern Matching, Type Classes and Overloading, Input/Output, Standard Haskell Classes Monads,...
Paul Hudak, John Peterson, Joseph Fasel