Sciweavers

2272 search results - page 251 / 455
» Provable Data Privacy
Sort
View
VTC
2007
IEEE
15 years 10 months ago
Modeling UpLink Power Control with Outage Probabilities
We investigate models for uplink interference in wireless systems. Our models account for the effects of outage probabilities. Such an accounting requires a nonlinear, even nonco...
Kenneth L. Clarkson, K. Georg Hampel, John D. Hobb...
FOCS
2006
IEEE
15 years 10 months ago
Higher Lower Bounds for Near-Neighbor and Further Rich Problems
We convert cell-probe lower bounds for polynomial space into stronger lower bounds for near-linear space. Our technique applies to any lower bound proved through the richness meth...
Mihai Patrascu, Mikkel Thorup
ASIACRYPT
2000
Springer
15 years 8 months ago
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new gen...
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hi...
174
Voted
CIMCA
2005
IEEE
15 years 6 months ago
Fuzzy System Modeling with the Genetic and Differential Evolutionary Optimization
This paper compares the performance of two provably successful evolutionary optimization tools in the optimization of a Fuzzy-Rule-Base (FRB) for the three well known fuzzy modeli...
Mehmet Bodur, Adnan Acan, Talip Akyol
KRDB
2003
111views Database» more  KRDB 2003»
15 years 5 months ago
A Framework for Answering Queries using Multiple Representation and Inference Techniques
The Polylog framework is designed to provide a language for efficiently automating complex queries of information represented in multiple formats. A Polylog program contains a set...
Nicholas L. Cassimatis