Sciweavers

CORR
2008
Springer
58views Education» more  CORR 2008»
13 years 8 months ago
On Ritt's decomposition Theorem in the case of finite fields
11 A classical theorem by Ritt states that all the complete decomposition chains of a univariate polynomial satisfying a certain tameness condition have the same length. In this p...
Jaime Gutierrez, David Sevilla
CORR
2008
Springer
79views Education» more  CORR 2008»
13 years 8 months ago
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
In this note we give a precise formulation of "resistance to arbitrary side information" and show that several relaxations of differential privacy imply it. The formulat...
Shiva Prasad Kasiviswanathan, Adam Smith
CORR
2008
Springer
47views Education» more  CORR 2008»
13 years 8 months ago
Artificial Immune Systems Tutorial
Uwe Aickelin, Dipankar Dasgupta
CORR
2008
Springer
85views Education» more  CORR 2008»
13 years 8 months ago
Introduction to Multi-Agent Simulation
Peer-Olaf Siebers, Uwe Aickelin
CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 8 months ago
Asymptotically Optimum Universal One-Bit Watermarking for Gaussian Covertexts and Gaussian Attacks
The problem of optimum watermark embedding and detection was addressed in a recent paper by Merhav and Sabbag, where the optimality criterion was the maximum false
Pedro Comesaña, Neri Merhav, Mauro Barni
CORR
2008
Springer
65views Education» more  CORR 2008»
13 years 8 months ago
Succinct Data Structures for Retrieval and Approximate Membership
Martin Dietzfelbinger, Rasmus Pagh
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
Void Traversal for Guaranteed Delivery in Geometric Routing
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorith...
Mikhail Nesterenko, Adnan Vora
CORR
2008
Springer
124views Education» more  CORR 2008»
13 years 8 months ago
A New Upper Bound for Max-2-Sat: A Graph-Theoretic Approach
In MaxSat, we ask for an assignment which satisfies the maximum number of clauses for a boolean formula in CNF. We present an algorithm yielding a run time upper bound of O (2 K 6....
Daniel Raible, Henning Fernau
CORR
2008
Springer
113views Education» more  CORR 2008»
13 years 8 months ago
Robustness, Risk, and Regularization in Support Vector Machines
We consider two new formulations for classification problems in the spirit of support vector machines based on robust optimization. Our formulations are designed to build in prote...
Huan Xu, Shie Mannor, Constantine Caramanis