Sciweavers

1322 search results - page 244 / 265
» Unsound Theorem Proving
Sort
View
HT
2011
ACM
12 years 11 months ago
Automatic mining of cognitive metadata using fuzzy inference
Personalized search and browsing is increasingly vital especially for enterprises to able to reach their customers. Key challenge in supporting personalization is the need for ric...
Melike Sah, Vincent Wade
RECOMB
2011
Springer
12 years 10 months ago
Algorithms for MDC-Based Multi-locus Phylogeny Inference
One of the criteria for inferring a species tree from a collection of gene trees, when gene tree incongruence is assumed to be due to incomplete lineage sorting (ILS), is minimize ...
Yun Yu, Tandy Warnow, Luay Nakhleh
IACR
2011
105views more  IACR 2011»
12 years 7 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
INFOCOM
2012
IEEE
11 years 10 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
STOC
2006
ACM
108views Algorithms» more  STOC 2006»
14 years 7 months ago
Gowers uniformity, influence of variables, and PCPs
Gowers [Gow98, Gow01] introduced, for d 1, the notion of dimension-d uniformity Ud (f) of a function f : G C, where G is a finite abelian group. Roughly speaking, if a function ...
Alex Samorodnitsky, Luca Trevisan