Sciweavers

204 search results - page 25 / 41
» Probabilistic Attributed Hashing
Sort
View
ICALT
2010
IEEE
13 years 10 months ago
A Social Network Analysis Perspective on Student Interaction within the Twitter Microblogging Environment
— This paper summarises the analyses of participant interaction within the Twitter microblogging environment. The study employs longitudinal probabilistic social network analysis...
Karen Stepanyan, Kerstin Borau, Carsten Ullrich
INFOCOM
2006
IEEE
14 years 3 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
ASIACRYPT
2010
Springer
13 years 7 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
ICTAI
2007
IEEE
14 years 4 months ago
Conceptual Clustering Categorical Data with Uncertainty
Many real datasets have uncertain categorical attribute values that are only approximately measured or imputed. Uncertainty in categorical data is commonplace in many applications...
Yuni Xia, Bowei Xi
SSPR
1998
Springer
14 years 2 months ago
Object Recognition from Large Structural Libraries
This paper presents a probabilistic similarity measure for object recognition from large libraries of line-patterns. We commence from a structural pattern representation which use...
Benoit Huet, Edwin R. Hancock