Sciweavers

3116 search results - page 43 / 624
» Recovering
Sort
View
ICML
2006
IEEE
14 years 8 months ago
An investigation of computational and informational limits in Gaussian mixture clustering
We investigate under what conditions clustering by learning a mixture of spherical Gaussians is (a) computationally tractable; and (b) statistically possible. We show that using p...
Nathan Srebro, Gregory Shakhnarovich, Sam T. Rowei...
FSE
1999
Springer
87views Cryptology» more  FSE 1999»
14 years 1 days ago
Attack on Six Rounds of Crypton
Abstract. In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Cryp...
Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart...
DSN
2004
IEEE
13 years 11 months ago
Caching-Enhanced Scalable Reliable Multicast
We present the Caching-Enhanced Scalable Reliable Multicast (CESRM) protocol. CESRM augments the Scalable Reliable Multicast (SRM) protocol [4,5] with a caching-based expedited re...
Carolos Livadas, Idit Keidar
AFRICACRYPT
2008
Springer
13 years 9 months ago
Differential Cryptanalysis of Reduced-Round PRESENT
: In this paper, we have presented flaws in differential cryptanalysis of reduced round variant of PRESENT given by M.Wang in [3] [4] for 80 bits key length and we have shown that ...
Meiqin Wang
COLING
2008
13 years 9 months ago
A Concept-Centered Approach to Noun-Compound Interpretation
A noun-compound is a compressed proposition that requires an audience to recover the implicit relationship between two concepts that are expressed as nouns. Listeners recover this...
Cristina Butnariu, Tony Veale