Sciweavers

2088 search results - page 54 / 418
» The Probabilistic Method
Sort
View
TIT
2008
52views more  TIT 2008»
13 years 10 months ago
Some Improved Bounds for Secure Frameproof Codes and Related Separating Hash Families
We present some improved bounds on necessary conditions for separating hash families of type {w, w} and type {w, w - 1}. In particular, these bounds apply to secure frameproof cod...
Douglas R. Stinson, Gregory M. Zaverucha
ICDM
2010
IEEE
127views Data Mining» more  ICDM 2010»
13 years 8 months ago
Learning Markov Network Structure with Decision Trees
Traditional Markov network structure learning algorithms perform a search for globally useful features. However, these algorithms are often slow and prone to finding local optima d...
Daniel Lowd, Jesse Davis
IPL
2008
82views more  IPL 2008»
13 years 10 months ago
A note on the distribution of the number of prime factors of the integers
The Chernoff-Hoeffding bounds are fundamental probabilistic tools. An elementary approach is presented to obtain a Chernoff-type upper-tail bound for the number of prime factors o...
Aravind Srinivasan
IWCMC
2006
ACM
14 years 4 months ago
A probabilistic voting-based filtering scheme in wireless sensor networks
In this paper, we study the fabricated report with false votes attack and the false votes on real reports attack in wireless sensor networks. Since most of the existing works addr...
Feng Li, Jie Wu
NIPS
1998
13 years 11 months ago
Bayesian Modeling of Facial Similarity
In previous work 6, 9, 10], we advanced a new technique for direct visual matching of images for the purposes of face recognition and image retrieval, using a probabilistic measur...
Baback Moghaddam, Tony Jebara, Alex Pentland