Sciweavers

79 search results - page 11 / 16
» The Last Fraction of a Fractional Conjecture
Sort
View
WDAG
2007
Springer
102views Algorithms» more  WDAG 2007»
14 years 1 months ago
A Denial-of-Service Resistant DHT
We consider the problem of designing scalable and robust information systems based on multiple servers that can survive even massive denial-of-service (DoS) attacks. More precisely...
Baruch Awerbuch, Christian Scheideler
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Camera notes
Taking notes is frequently required in daily life. The rapid development of consumer devices provides new ways to achieve this goal such as taking notes by digital cameras, camcor...
Xian-Sheng Hua, Shipeng Li, Hong-Jiang Zhang
ASIACRYPT
2006
Springer
13 years 11 months ago
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the a...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
BMCBI
2006
98views more  BMCBI 2006»
13 years 7 months ago
The Secrets of a Functional Synapse - From a Computational and Experimental Viewpoint
Background: Neuronal communication is tightly regulated in time and in space. The neuronal transmission takes place in the nerve terminal, at a specialized structure called the sy...
Michal Linial
ICML
2008
IEEE
14 years 8 months ago
Statistical models for partial membership
We present a principled Bayesian framework for modeling partial memberships of data points to clusters. Unlike a standard mixture model which assumes that each data point belongs ...
Katherine A. Heller, Sinead Williamson, Zoubin Gha...