Sciweavers

858 search results - page 16 / 172
» One Is Enough!
Sort
View
AAAI
2006
13 years 10 months ago
An Edge Deletion Semantics for Belief Propagation and its Practical Impact on Approximation Quality
We show in this paper that the influential algorithm of iterative belief propagation can be understood in terms of exact inference on a polytree, which results from deleting enoug...
Arthur Choi, Adnan Darwiche
VIP
2003
13 years 10 months ago
On the Structural Algorithm of Filtering Graphs for Layout
When the amount of information in visualization becomes large enough, users can not perceive all elements at the same time. This problem can be solved by removing parts of the inf...
Xiaodi Huang, Wei Lai
ESWS
2011
Springer
13 years 9 days ago
miKrow: Semantic Intra-enterprise Micro-Knowledge Management System
Abstract. Knowledge Management systems are one of the key strategies that allow companies to fully tap into their collective knowledge. However, two main entry barriers currently l...
Víctor Penela, Guillermo Álvaro, Car...
GLOBECOM
2007
IEEE
14 years 3 months ago
The Design and Analysis of Protocol Sequences for Robust Wireless Accessing
Abstract—In this paper, a family of linear congruence sequences with interesting cross-correlation properties is investigated for potential applications in defining new multiple...
Chung Shue Chen, Wing Shing Wong, Yeqiong Song
PKC
2007
Springer
147views Cryptology» more  PKC 2007»
14 years 2 months ago
New Chosen-Ciphertext Attacks on NTRU
We present new and efficient key-recovery chosen-ciphertext attacks on NTRUencrypt. Our attacks are somewhat intermediate between chosen-ciphertext attacks on NTRUencrypt previousl...
Nicolas Gama, Phong Q. Nguyen