Sciweavers

384 search results - page 41 / 77
» Eliciting properties of probability distributions
Sort
View
CONCUR
1994
Springer
14 years 2 months ago
Composition and Behaviors of Probabilistic I/O Automata
We augment the I/O automaton model of Lynch and Tuttle with probability, as a step toward the ultimate goal of obtaining a useful tool for specifying and reasoning about asynchron...
Sue-Hwey Wu, Scott A. Smolka, Eugene W. Stark
NIPS
2008
13 years 11 months ago
Characteristic Kernels on Groups and Semigroups
Embeddings of random variables in reproducing kernel Hilbert spaces (RKHSs) may be used to conduct statistical inference based on higher order moments. For sufficiently rich (char...
Kenji Fukumizu, Bharath K. Sriperumbudur, Arthur G...
ECCC
2007
185views more  ECCC 2007»
13 years 10 months ago
Trapdoors for Hard Lattices and New Cryptographic Constructions
We show how to construct a variety of “trapdoor” cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the sho...
Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
PEWASUN
2008
ACM
13 years 11 months ago
Source traffic modeling in wireless sensor networks for target tracking
Researches around wireless sensor network (WSN) were very prolific recently. However, traffic modeling related WSN research was poorly less. In this paper, source traffic dynamics...
Qinghua Wang, Tingting Zhang
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 4 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...