Sciweavers

2184 search results - page 145 / 437
» Relative Entropy and Statistics
Sort
View
111
Voted
ISCI
2008
116views more  ISCI 2008»
15 years 24 days ago
On the J-divergence of intuitionistic fuzzy sets with its application to pattern recognition
The importance of suitable distance measures between intuitionistic fuzzy sets (IFSs) arises because of the role they play in the inference problem. A concept closely related to o...
Wen-Liang Hung, Miin-Shen Yang
93
Voted
IJNSEC
2006
71views more  IJNSEC 2006»
15 years 24 days ago
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust pr...
Rama Murthy Garimella
120
Voted
IACR
2011
192views more  IACR 2011»
14 years 13 days ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
CSB
2002
IEEE
117views Bioinformatics» more  CSB 2002»
15 years 5 months ago
A Literature Based Method for Identifying Gene-Disease Connections
We present a statistical method that can swiftly identify, from the literature, sets of genes known to be associated with given diseases. It offers a comprehensive way to treat al...
Lada A. Adamic, Dennis M. Wilkinson, Bernardo A. H...
IH
2001
Springer
15 years 5 months ago
F5-A Steganographic Algorithm
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
Andreas Westfeld