Sciweavers

315 search results - page 13 / 63
» Claims Analysis
Sort
View
139
Voted
APWEB
2006
Springer
15 years 7 months ago
Connecting Sensor Networks with TCP/IP Network
Wireless sensor networks cannot have meaningful work without connecting with TCP/IP based network. In this paper, we analyze and compare all the existing solutions for connecting s...
Shu Lei, Jin Wang, Hui Xu, Jinsung Cho, Sungyoung ...
146
Voted
IJNSEC
2007
131views more  IJNSEC 2007»
15 years 3 months ago
On the Security of Huang-Chang Multi-signature Schemes
Recently, based on RSA and discrete logarithm with composite modulus, Huang and Chang proposed two multisignature schemes with distinguished signing authority and claimed that the...
Jianhong Zhang, Wei Zou
201
Voted
JMLR
2012
13 years 6 months ago
Deep Boltzmann Machines as Feed-Forward Hierarchies
The deep Boltzmann machine is a powerful model that extracts the hierarchical structure of observed data. While inference is typically slow due to its undirected nature, we argue ...
Grégoire Montavon, Mikio L. Braun, Klaus-Ro...
161
Voted
KDD
2006
ACM
149views Data Mining» more  KDD 2006»
16 years 4 months ago
Regularized discriminant analysis for high dimensional, low sample size data
Linear and Quadratic Discriminant Analysis have been used widely in many areas of data mining, machine learning, and bioinformatics. Friedman proposed a compromise between Linear ...
Jieping Ye, Tie Wang
125
Voted
SEFM
2008
IEEE
15 years 10 months ago
Nullness Analysis in Boolean Form
Attempts to dereference null result in an exception or a segmentation fault. Hence it is important to know those program points where this might occur and prove the others (or the...
Fausto Spoto