Sciweavers

3319 search results - page 350 / 664
» Type Theoretical Databases
Sort
View
139
Voted
NIPS
2000
15 years 5 months ago
Active Learning for Parameter Estimation in Bayesian Networks
Bayesian networks are graphical representations of probability distributions. In virtually all of the work on learning these networks, the assumption is that we are presented with...
Simon Tong, Daphne Koller
100
Voted
AUTOMATICA
2007
75views more  AUTOMATICA 2007»
15 years 3 months ago
System theory for numerical analysis
Many numerical schemes can be suitably studied from a system theoretic point of view. This paper studies the relationship between the two disciplines, that is, numerical analysis ...
Kenji Kashima, Yutaka Yamamoto
110
Voted
CHINAF
2008
110views more  CHINAF 2008»
15 years 3 months ago
Classification of signature-only signature models
We introduce a set of criterions for classifying signature-only signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoret...
Zhengjun Cao, Mulan Liu
108
Voted
IEICET
2008
113views more  IEICET 2008»
15 years 3 months ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...
131
Voted
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 3 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati