Sciweavers

2333 search results - page 182 / 467
» Recursive Computational Depth
Sort
View
111
Voted
ICMLA
2008
15 years 3 months ago
Farthest Centroids Divisive Clustering
A method is presented to partition a given set of data entries embedded in Euclidean space by recursively bisecting clusters into smaller ones. The initial set is subdivided into ...
Haw-ren Fang, Yousef Saad
108
Voted
DBSEC
2008
103views Database» more  DBSEC 2008»
15 years 3 months ago
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Abstract. When generalization algorithms are known to the public, an adversary can obtain a more precise estimation of the secret table than what can be deduced from the disclosed ...
Lei Zhang 0004, Lingyu Wang, Sushil Jajodia, Alexa...
INFORMATICALT
2000
101views more  INFORMATICALT 2000»
15 years 2 months ago
Closed-loop Robust Identification Using the Indirect Approach
In the previous paper (Pupeikis, 2000) the problem of closed-loop robust identification using the direct approach in the presence of outliers in observations have been considered. ...
Rimantas Pupeikis
113
Voted
AML
1999
86views more  AML 1999»
15 years 2 months ago
Subrecursive functions on partial sequences
The paper studies a domain theoretical notion of primitive recursion over partial sequences in the context of Scott domains. Based on a non-monotone coding of partial sequences, t...
Karl-Heinz Niggl
SPC
2005
Springer
15 years 8 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...