Sciweavers

3229 search results - page 35 / 646
» Theories with the Independence Property
Sort
View
TC
1998
13 years 8 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
JCP
2007
100views more  JCP 2007»
13 years 8 months ago
Extraction of Unique Independent Components for Nonlinear Mixture of Sources
—In this paper, a neural network solution to extract independent components from nonlinearly mixed signals is proposed. Firstly, a structurally constrained mixing model is introd...
Pei Gao, Li Chin Khor, Wai Lok Woo, Satnam Singh D...
JGT
2007
85views more  JGT 2007»
13 years 8 months ago
On graphs with subgraphs having large independence numbers
: Let G be a graph on n vertices in which every induced subgraph on s = log3 n vertices has an independent set of size at least t = log n. What is the largest q = q(n) so that ever...
Noga Alon, Benny Sudakov
NN
2000
Springer
177views Neural Networks» more  NN 2000»
13 years 8 months ago
Independent component analysis: algorithms and applications
A fundamental problem in neural network research, as well as in many other disciplines, is finding a suitable representation of multivariate data, i.e. random vectors. For reasons...
Aapo Hyvärinen, Erkki Oja
PODS
2008
ACM
174views Database» more  PODS 2008»
14 years 8 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...