Sciweavers

3750 search results - page 658 / 750
» Timed Automata Patterns
Sort
View
JOC
2008
92views more  JOC 2008»
13 years 10 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
JSS
2008
116views more  JSS 2008»
13 years 10 months ago
Characterization of the evolution of a news Web site
The Web has become a ubiquitous tool for distributing knowledge and information and for conducting businesses. To exploit the huge potential of the Web as a global information rep...
Mariacarla Calzarossa, Daniele Tessera
KAIS
2008
165views more  KAIS 2008»
13 years 10 months ago
Multirelational classification: a multiple view approach
Multirelational classification aims at discovering useful patterns across multiple inter-connected tables (relations) in a relational database. Many traditional learning techniques...
Hongyu Guo, Herna L. Viktor
ECCC
2007
180views more  ECCC 2007»
13 years 10 months ago
Adaptive Algorithms for Online Decision Problems
We study the notion of learning in an oblivious changing environment. Existing online learning algorithms which minimize regret are shown to converge to the average of all locally...
Elad Hazan, C. Seshadhri
KES
2008
Springer
13 years 10 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...