Sciweavers

400 search results - page 61 / 80
» Extended formulations in combinatorial optimization
Sort
View
KDD
2007
ACM
197views Data Mining» more  KDD 2007»
14 years 7 months ago
Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming
The kernel function plays a central role in kernel methods. In this paper, we consider the automated learning of the kernel matrix over a convex combination of pre-specified kerne...
Jieping Ye, Shuiwang Ji, Jianhui Chen
EUROCRYPT
2001
Springer
13 years 11 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
TIT
2010
136views Education» more  TIT 2010»
13 years 1 months ago
The existence of concatenated codes list-decodable up to the hamming bound
We prove that binary linear concatenated codes with an outer algebraic code (specifically, a folded Reed-Solomon code) and independently and randomly chosen linear inner codes ach...
Venkatesan Guruswami, Atri Rudra
INFOCOM
2009
IEEE
14 years 1 months ago
Using Failure Models for Controlling Data Availability in Wireless Sensor Networks
— This paper presents Pirrus, a replica management system that addresses the problem of providing data availability on a wireless sensor network. Pirrus uses probabilistic failur...
Riccardo Crepaldi, Mirko Montanari, Indranil Gupta...
INFOCOM
2006
IEEE
14 years 23 days ago
Cross-Layer Congestion Control, Routing and Scheduling Design in Ad Hoc Wireless Networks
Abstract— This paper considers jointly optimal design of crosslayer congestion control, routing and scheduling for ad hoc wireless networks. We first formulate the rate constrai...
Lijun Chen, Steven H. Low, Mung Chiang, John C. Do...