Sciweavers

10412 search results - page 1828 / 2083
» The efficiency of algorithms - misconceptions
Sort
View
143
Voted
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 5 months ago
Logical complexity of graphs: a survey
We discuss the definability of finite graphs in first-order logic with two relation symbols for adjacency and equality of vertices. The logical depth D(G) of a graph G is equal to ...
Oleg Pikhurko, Oleg Verbitsky
COMCOM
2008
143views more  COMCOM 2008»
15 years 5 months ago
Cross-layer rate control, medium access control and routing design in cooperative VANET
In this paper, we address the rate control, the Medium Access Control (MAC) and the routing problem for cooperative Vehicular Ad-Hoc Network (VANET) in the framework of cross-laye...
Liang Zhou, Baoyu Zheng, Benoit Geller, Anne Wei, ...
CORR
2010
Springer
76views Education» more  CORR 2010»
15 years 5 months ago
Query Strategies for Evading Convex-Inducing Classifiers
Classifiers are often used to detect miscreant activities. We study how an adversary can systematically query a classifier to elicit information that allows the adversary to evade...
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Hua...
CORR
2010
Springer
102views Education» more  CORR 2010»
15 years 5 months ago
Structure of random r-SAT below the pure literal threshold
It is well known that there is a sharp density threshold for a random r-SAT formula to be satisfiable, and a similar, smaller, threshold for it to be satisfied by the pure literal ...
Alexander D. Scott, Gregory B. Sorkin
CORR
2008
Springer
159views Education» more  CORR 2008»
15 years 5 months ago
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data
We consider privacy preserving decision tree induction via ID3 in the case where the training data is horizontally or vertically distributed. Furthermore, we consider the same pro...
Bart Kuijpers, Vanessa Lemmens, Bart Moelans, Karl...
« Prev « First page 1828 / 2083 Last » Next »