Sciweavers

117 search results - page 16 / 24
» Entropy and Inference, Revisited
Sort
View
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
14 years 1 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
ACNS
2005
Springer
93views Cryptology» more  ACNS 2005»
14 years 8 days ago
Messin' with Texas Deriving Mother's Maiden Names Using Public Records
We have developed techniques to automatically infer mother's maiden names from public records. We demonstrate our techniques using publicly available records from the state o...
Virgil Griffith, Markus Jakobsson
ICML
2009
IEEE
14 years 7 months ago
MedLDA: maximum margin supervised topic models for regression and classification
Supervised topic models utilize document's side information for discovering predictive low dimensional representations of documents; and existing models apply likelihoodbased...
Jun Zhu, Amr Ahmed, Eric P. Xing
DCC
2010
IEEE
14 years 1 months ago
Lossless Compression Based on the Sequence Memoizer
In this work we describe a sequence compression method based on combining a Bayesian nonparametric sequence model with entropy encoding. The model, a hierarchy of Pitman-Yor proce...
Jan Gasthaus, Frank Wood, Yee Whye Teh
INDOCRYPT
2004
Springer
14 years 2 days ago
Information Theory and the Security of Binary Data Perturbation
Random data perturbation (RDP) has been in use for several years in statistical databases and public surveys as a means of providing privacy to individuals while collecting informa...
Poorvi L. Vora