Sciweavers

1510 search results - page 179 / 302
» Upper Probabilities and Additivity
Sort
View
GC
2004
Springer
15 years 9 months ago
Towards a Formal Treatment of Secrecy Against Computational Adversaries
Polynomial time adversaries based on a computational view of cryptography have additional capabilities that the classical Dolev-Yao adversary model does not include. To relate thes...
Angelo Troina, Alessandro Aldini, Roberto Gorrieri
PAKDD
2004
ACM
96views Data Mining» more  PAKDD 2004»
15 years 9 months ago
Spectral Energy Minimization for Semi-supervised Learning
The use of unlabeled data to aid classification is important as labeled data is often available in limited quantity. Instead of utilizing training samples directly into semi-super...
Chun Hung Li, Zhi-Li Wu
VOSS
2004
Springer
125views Mathematics» more  VOSS 2004»
15 years 9 months ago
Probabilistic Automata: System Types, Parallel Composition and Comparison
We survey various notions of probabilistic automata and probabilistic bisimulation, accumulating in an expressiveness hierarchy of probabilistic system types. The aim of this paper...
Ana Sokolova, Erik P. de Vink
129
Voted
ISIPTA
2003
IEEE
15 years 9 months ago
Graphical Representation of Asymmetric Graphoid Structures
Independence models induced by some uncertainty measures (e.g. conditional probability, possibility) do not obey the usual graphoid properties, since they do not satisfy the symme...
Barbara Vantaggi
LCN
2002
IEEE
15 years 9 months ago
Link Stability in Mobile Wireless Ad Hoc Networks
In this paper, we develop adaptive metrics to identify stable links in a mobile wireless networking environment based on the analysis of link durations in several different mobili...
Michael Gerharz, Christian de Waal, Matthias Frank...