Sciweavers

2370 search results - page 67 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
123
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Delay-bounded adaptive UFH-based anti-jamming wireless communication
—Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of uncoordinated freque...
Qian Wang, Ping Xu, Kui Ren, Xiang-yang Li
130
Voted
ICDT
2012
ACM
247views Database» more  ICDT 2012»
13 years 5 months ago
A normal form for preventing redundant tuples in relational databases
We introduce a new normal form, called essential tuple normal form (ETNF), for relations in a relational database where the constraints are given by functional dependencies and jo...
Hugh Darwen, C. J. Date, Ronald Fagin
JCS
2011
72views more  JCS 2011»
14 years 10 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
152
Voted
TCS
2011
14 years 10 months ago
Two faces of active learning
An active learner has a collection of data points, each with a label that is initially hidden but can be obtained at some cost. Without spending too much, it wishes to find a cla...
Sanjoy Dasgupta
117
Voted
JMLR
2010
92views more  JMLR 2010»
14 years 10 months ago
Posterior distributions are computable from predictive distributions
As we devise more complicated prior distributions, will inference algorithms keep up? We highlight a negative result in computable probability theory by Ackerman, Freer, and Roy (...
Cameron E. Freer, Daniel M. Roy