Sciweavers

1399 search results - page 76 / 280
» New Algorithms for k-Center and Extensions
Sort
View
GLOBECOM
2010
IEEE
13 years 7 months ago
Multicasting in Delay Tolerant Networks: Delegation Forwarding
Delay tolerant networks (DTNs) are a kind of wireless mobile network which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users...
Yunsheng Wang, Xiaoguang Li, Jie Wu
ICLP
2009
Springer
14 years 9 months ago
Logic Programming with Defaults and Argumentation Theories
We define logic programs with defaults and argumentation theories, a new framework that unifies most of the earlier proposals for defeasible reasoning in logic programming. We pres...
Hui Wan, Benjamin N. Grosof, Michael Kifer, Paul F...
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 9 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
VLDB
2008
ACM
147views Database» more  VLDB 2008»
14 years 9 months ago
Providing k-anonymity in data mining
In this paper we present extended definitions of k-anonymity and use them to prove that a given data mining model does not violate the k-anonymity of the individuals represented in...
Arik Friedman, Ran Wolff, Assaf Schuster
ISCAS
2007
IEEE
108views Hardware» more  ISCAS 2007»
14 years 3 months ago
Linear Prediction Based Semi-Blind Channel Estimation for MIMO-OFDM System
— In this paper, a semi-blind channel estimation method is presented for MIMO-OFDM systems. The new method uses the linear prediction for obtaining a blind constraint on the MIMO...
Feng Wan, Wei-Ping Zhu, M. N. S. Swamy