Sciweavers

448 search results - page 69 / 90
» Sensitivity Analysis for MAP MAP 1 Queues
Sort
View
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
15 years 3 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
70
Voted
ICIAR
2005
Springer
15 years 3 months ago
Shape Similarity Measurement for Boundary Based Features
In this study, we propose two algorithms for measuring the distance between shape boundaries. In the algorithms, shape boundary is represented by the Beam Angle Statistics (BAS), w...
Nafiz Arica, Fatos T. Yarman-Vural
FSE
2003
Springer
134views Cryptology» more  FSE 2003»
15 years 2 months ago
A New Class of Collision Attacks and Its Application to DES
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal output of a hash function. Previous collision attack...
Kai Schramm, Thomas J. Wollinger, Christof Paar
80
Voted
IBPRIA
2003
Springer
15 years 2 months ago
Supervised Locally Linear Embedding Algorithm for Pattern Recognition
The dimensionality of the input data often far exceeds their intrinsic dimensionality. As a result, it may be difficult to recognize multidimensional data, especially if the number...
Olga Kouropteva, Oleg Okun, Matti Pietikäinen
103
Voted
IPPS
1998
IEEE
15 years 1 months ago
A Molecular Quasi-Random Model of Computations Applied to Evaluate Collective Intelligence
The paper presents how the Random PROLOG Processor (RPP), a bio-inspired model of computations, can be used for formalization and analysis of a phenomenon - the Collective Intelli...
Tadeusz Szuba