Sciweavers

197 search results - page 4 / 40
» On the Existence of Large Sets of t-designs of Prime Sizes
Sort
View
IACR
2011
128views more  IACR 2011»
12 years 7 months ago
Sign Modules in Secure Arithmetic Circuits
In this paper, we study the complexity of secure multiparty computation using only the secure arithmetic black-box of a finite field, counting the cost by the number of secure m...
Ching-Hua Yu
KDD
2006
ACM
149views Data Mining» more  KDD 2006»
14 years 7 months ago
Regularized discriminant analysis for high dimensional, low sample size data
Linear and Quadratic Discriminant Analysis have been used widely in many areas of data mining, machine learning, and bioinformatics. Friedman proposed a compromise between Linear ...
Jieping Ye, Tie Wang
ITIIS
2010
192views more  ITIIS 2010»
13 years 5 months ago
Large-Scale Integrated Network System Simulation with DEVS-Suite
Formidable growth of Internet technologies has revealed challenging issues about its scale and performance evaluation. Modeling and simulation play a central role in the evaluatio...
Ahmet Zengin
COMSWARE
2007
IEEE
14 years 1 months ago
Smaller Connected Dominating Sets in Ad Hoc and Sensor Networks based on Coverage by Two-Hop Neighbors
— In this paper, we focus on the construction of an efficient dominating set in ad hoc and sensor networks. A set of nodes is said to be dominating if each node is either itself...
François Ingelrest, David Simplot-Ryl, Ivan...
SIGMETRICS
2011
ACM
270views Hardware» more  SIGMETRICS 2011»
12 years 10 months ago
Scalable monitoring via threshold compression in a large operational 3G network
Threshold-based performance monitoring in large 3G networks is very challenging for two main factors: large network scale and dynamics in both time and spatial domains. There exis...
Suk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Io...