Sciweavers

3229 search results - page 35 / 646
» Theories with the Independence Property
Sort
View
TC
1998
14 years 11 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
JCP
2007
100views more  JCP 2007»
14 years 11 months ago
Extraction of Unique Independent Components for Nonlinear Mixture of Sources
—In this paper, a neural network solution to extract independent components from nonlinearly mixed signals is proposed. Firstly, a structurally constrained mixing model is introd...
Pei Gao, Li Chin Khor, Wai Lok Woo, Satnam Singh D...
JGT
2007
85views more  JGT 2007»
14 years 11 months ago
On graphs with subgraphs having large independence numbers
: Let G be a graph on n vertices in which every induced subgraph on s = log3 n vertices has an independent set of size at least t = log n. What is the largest q = q(n) so that ever...
Noga Alon, Benny Sudakov
NN
2000
Springer
177views Neural Networks» more  NN 2000»
14 years 11 months ago
Independent component analysis: algorithms and applications
A fundamental problem in neural network research, as well as in many other disciplines, is finding a suitable representation of multivariate data, i.e. random vectors. For reasons...
Aapo Hyvärinen, Erkki Oja
PODS
2008
ACM
174views Database» more  PODS 2008»
15 years 12 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...