Sciweavers

95 search results - page 5 / 19
» CORR 2012
Sort
View
CORR
2012
Springer
210views Education» more  CORR 2012»
12 years 5 months ago
Topological phase transition in a network model with preferential attachment and node removal
Preferential attachment is a popular model of growing networks. We consider a generalized model with random node removal, and a combination of preferential and random attachment. U...
Heiko Bauke, Cristopher Moore, Jean-Baptiste Rouqu...
CORR
2012
Springer
162views Education» more  CORR 2012»
12 years 5 months ago
Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method
In this paper, we proposed an authentication method according to Diffie-Hellman. First, we introduce different methods for authentication in IEEE.802.16 then we proposed an authen...
Mohammad Zabihi, Ramin Shaghaghi, Mohammad Esmail ...
CORR
2012
Springer
185views Education» more  CORR 2012»
12 years 5 months ago
Bayesian network learning with cutting planes
The problem of learning the structure of Bayesian networks from complete discrete data with a limit on parent set size is considered. Learning is cast explicitly as an optimisatio...
James Cussens
CORR
2012
Springer
198views Education» more  CORR 2012»
12 years 5 months ago
Lipschitz Parametrization of Probabilistic Graphical Models
We show that the log-likelihood of several probabilistic graphical models is Lipschitz continuous with respect to the ￿p-norm of the parameters. We discuss several implications ...
Jean Honorio
CORR
2012
Springer
217views Education» more  CORR 2012»
12 years 5 months ago
An Adaptive Mechanism for Accurate Query Answering under Differential Privacy
We propose a novel mechanism for answering sets of counting queries under differential privacy. Given a workload of counting queries, the mechanism automatically selects a differ...
Chao Li, Gerome Miklau