Sciweavers

15379 search results - page 3062 / 3076
» Protecting users from
Sort
View
TIT
2011
120views more  TIT 2011»
13 years 3 months ago
The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver wiretap channel in which a transmitter wants to have confidential communication with ...
Ersen Ekrem, Sennur Ulukus
TSMC
2011
228views more  TSMC 2011»
13 years 3 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
WWW
2011
ACM
13 years 3 months ago
Addressing people's information needs directly in a web search result page
Web search engines have historically focused on connecting people with information resources. For example, if a person wanted to know when their flight to Hyderabad was leaving, a...
Lydia B. Chilton, Jaime Teevan
WWW
2011
ACM
13 years 3 months ago
Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitte
There is a widespread intuitive sense that different kinds of information spread differently on-line, but it has been difficult to evaluate this question quantitatively since it ...
Daniel M. Romero, Brendan Meeder, Jon M. Kleinberg
ML
2010
ACM
163views Machine Learning» more  ML 2010»
13 years 3 months ago
Classification with guaranteed probability of error
We introduce a general-purpose learning machine that we call the Guaranteed Error Machine, or GEM, and two learning algorithms, a real GEM algorithm and an ideal GEM algorithm. Th...
Marco C. Campi
« Prev « First page 3062 / 3076 Last » Next »