Sciweavers

2938 search results - page 65 / 588
» On obfuscating point functions
Sort
View
TMC
2010
179views more  TMC 2010»
13 years 8 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
JNS
2010
107views more  JNS 2010»
13 years 4 months ago
Ground States and Critical Points for Aubry-Mather Theory in Statistical Mechanics
We consider statistical mechanics systems defined on a set with some symmetry properties (namely, the set admits an action by a group, which is finitely generated and residually fi...
Rafael de La Llave, Enrico Valdinoci
KDD
2001
ACM
192views Data Mining» more  KDD 2001»
14 years 10 months ago
Data mining with sparse grids using simplicial basis functions
Recently we presented a new approach [18] to the classification problem arising in data mining. It is based on the regularization network approach but, in contrast to other method...
Jochen Garcke, Michael Griebel
STACS
2012
Springer
12 years 5 months ago
The Denjoy alternative for computable functions
The Denjoy-Young-Saks Theorem from classical analysis states that for an arbitrary function f : R → R, the Denjoy alternative holds outside a null set, i.e., for almost every re...
Laurent Bienvenu, Rupert Hölzl, Joseph S. Mil...
JCC
2007
162views more  JCC 2007»
13 years 10 months ago
Bond electron pair: Its relevance and analysis from the quantum chemistry point of view
: This paper first comments on the surprisingly poor status that Quantum Chemistry has offered to the fantastic intuition of Lewis concerning the distribution of the electrons in ...
Jean-Paul Malrieu, Nathalie Guihéry, Carmen...