Sciweavers

1064 search results - page 138 / 213
» Cryptography from Anonymity
Sort
View
NIPS
2007
13 years 11 months ago
Compressed Regression
Recent research has studied the role of sparsity in high dimensional regression and signal reconstruction, establishing theoretical limits for recovering sparse models from sparse...
Shuheng Zhou, John D. Lafferty, Larry A. Wasserman
NIPS
1996
13 years 11 months ago
Probabilistic Interpretation of Population Codes
We present a general encoding-decoding framework for interpreting the activity of a population of units. A standard population code interpretation method, the Poisson model, start...
Richard S. Zemel, Peter Dayan, Alexandre Pouget
CCS
2010
ACM
13 years 10 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper
NETWORKS
2006
13 years 10 months ago
Black hole search in common interconnection networks
Mobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that de...
Stefan Dobrev, Paola Flocchini, Rastislav Kralovic...
DATAMINE
2002
135views more  DATAMINE 2002»
13 years 10 months ago
Discovery and Evaluation of Aggregate Usage Profiles for Web Personalization
: Web usage mining, possibly used in conjunction with standard approaches to personalization such as collaborative filtering, can help address some of the shortcomings of these tec...
Bamshad Mobasher, Honghua Dai, Tao Luo, Miki Nakag...