Sciweavers

438 search results - page 58 / 88
» The forest hiding problem
Sort
View
JCS
2008
93views more  JCS 2008»
14 years 11 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
CCE
2005
14 years 11 months ago
Integrating CDU, FCC and product blending models into refinery planning
The accuracy of using linear models for crude distillation unit (CDU), fluidize-bed catalytic cracker (FCC) and product blending in refinery planning has been debated for decades....
Wenkai Li, Chi-Wai Hui, AnXue Li
DPD
1998
141views more  DPD 1998»
14 years 11 months ago
Dynamic Query Operator Scheduling for Wide-Area Remote Access
Distributed databases operating over wide-area networks such as the Internet, must deal with the unpredictable nature of the performance of communication. The response times of acc...
Laurent Amsaleg, Michael J. Franklin, Anthony Toma...
ICSE
2009
IEEE-ACM
14 years 9 months ago
Software Assumptions Failure Tolerance: Role, Strategies, and Visions
Abstract. At our behest or otherwise, while our software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. Wh...
Vincenzo De Florio
SDM
2012
SIAM
282views Data Mining» more  SDM 2012»
13 years 2 months ago
Citation Prediction in Heterogeneous Bibliographic Networks
To reveal information hiding in link space of bibliographical networks, link analysis has been studied from different perspectives in recent years. In this paper, we address a no...
Xiao Yu, Quanquan Gu, Mianwei Zhou, Jiawei Han