Sciweavers

374 search results - page 29 / 75
» Measuring Information Leakage Using Generalized Gain Functio...
Sort
View
CORR
2011
Springer
160views Education» more  CORR 2011»
13 years 2 months ago
When is social computation better than the sum of its parts?
good solutions to complex problems. In many examples, individuals trying to solve superior global solution. This suggests that there may be general principles of information aggre...
Vadas Gintautas, Aric A. Hagberg, Luís M. A...
SIAMCOMP
2002
138views more  SIAMCOMP 2002»
13 years 7 months ago
Phase Change of Limit Laws in the Quicksort Recurrence under Varying Toll Functions
We characterize all limit laws of the quicksort type random variables defined recursively by Xn d = XIn + X n-1-In + Tn when the "toll function" Tn varies and satisfies ...
Hsien-Kuei Hwang, Ralph Neininger
ICONIP
2009
13 years 5 months ago
Data Modelling for Analysis of Adaptive Changes in Fly Photoreceptors
Adaptation is a hallmark of sensory processing. We studied neural adaptation in intracellular voltage responses of the R1-R6 photoreceptors, of the fruit fly Drosophila, subjected ...
Uwe Friederich, Daniel Coca, Stephen A. Billings, ...
DKE
2002
218views more  DKE 2002»
13 years 7 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
DRM
2007
Springer
14 years 1 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...