Sciweavers

3190 search results - page 100 / 638
» cans 2011
Sort
View
91
Voted
JCT
2011
74views more  JCT 2011»
14 years 7 months ago
Quasisymmetric Schur functions
Abstract. We introduce a new basis for quasisymmetric functions, which arise from a specialization of nonsymmetric Macdonald polynomials to standard bases, also known as Demazure a...
James Haglund, Kurt W. Luoto, Sarah Mason, Stephan...
82
Voted
JCT
2011
62views more  JCT 2011»
14 years 7 months ago
Anti-lecture hall compositions and overpartitions
We show that the number of anti-lecture hall compositions of n with the first entry not exceeding k − 2 equals the number of overpartitions of n with non-overlined parts not con...
William Y. C. Chen, Doris D. M. Sang, Diane Y. H. ...
JMLR
2011
148views more  JMLR 2011»
14 years 7 months ago
Bayesian Generalized Kernel Mixed Models
We propose a fully Bayesian methodology for generalized kernel mixed models (GKMMs), which are extensions of generalized linear mixed models in the feature space induced by a repr...
Zhihua Zhang, Guang Dai, Michael I. Jordan
108
Voted
JNCA
2011
123views more  JNCA 2011»
14 years 7 months ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...
121
Voted
JNCA
2011
185views more  JNCA 2011»
14 years 7 months ago
Design of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Gerhard P. Hancke