Sciweavers

12194 search results - page 67 / 2439
» cans 2010
Sort
View
ENTCS
2007
96views more  ENTCS 2007»
13 years 8 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...
ISITA
2010
13 years 3 months ago
Optimality of LDGM-LDPC compound codes for lossy compression of binary erasure source
We consider the Binary Erasure Source (BES) introduced by Martinian and Yedidia. Based on the technique introduced by Martinian and Wainwright, we upper bound the rate-distortion p...
Gregory Demay, Vishwambhar Rathi, Lars K. Rasmusse...
EDM
2010
129views Data Mining» more  EDM 2010»
13 years 10 months ago
Skill Set Profile Clustering: The Empty K-Means Algorithm with Automatic Specification of Starting Cluster Centers
While students' skill set profiles can be estimated with formal cognitive diagnosis models [8], their computational complexity makes simpler proxy skill estimates attractive [...
Rebecca Nugent, Nema Dean, Elizabeth Ayers
CMS
2006
110views Communications» more  CMS 2006»
13 years 10 months ago
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
Abstract. Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhan...
Giannakis Antoniou, Campbell Wilson, Dimitris Gene...
ADAC
2010
105views more  ADAC 2010»
13 years 8 months ago
Inference for robust canonical variate analysis
We consider the problem of optimally separating two multivariate populations. Robust linear discriminant rules can be obtained by replacing the empirical means and covariance in th...
Stefan Van Aelst, Gert Willems