• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13
Next 10 →

Dense Point Sets Have Sparse Delaunay Triangulations

by Jeff Erickson
"... Delaunay triangulations and Voronoi diagrams are one of the most thoroughly studies objects in computational geometry, with numerous applications including nearest-neighbor searching, clustering, finite-element mesh generation, deformable surface modeling, and surface reconstruction. Many algorithms ..."
Abstract - Cited by 29 (2 self) - Add to MetaCart
is almost never observed in practice except for highly-contrived inputs. For all practical purposes, three-dimensional Delaunay triangulations appear to have linear complexity. This frustrating

Unsupervised concept learning and value systematicity: A complex whole aids learning the parts

by Dorrit Billman, James Knutson - Journal of Experimental Psychology: Learning, Memory, and Cognition , 1996
"... Ease of learning new concepts may best be understood by simultaneously considering models of learning and theories of how "good " systems of categories are organized. The authors tested the effects on learning of value systematicity, a proposed organizing principle: If 1 attribute is predi ..."
Abstract - Cited by 48 (2 self) - Add to MetaCart
is predictive of another, it should predict still more. This principle derives from focused sampling in the internal feedback model (D. Billman & E. Heit, 1988) of unsupervised, or observational, learning. In 3 experiments, the authors tested how the organization of structure in input (value systematicity

The Synthesis of Cyclic Combinational Circuits

by Marc D. Riedel, Jehoshua Bruck - In Design Automation Conference (DAC , 2003
"... Digital circuits are called combinational if they are memoryless: they have outputs that depend only on the current values of the inputs. Combinational circuits are generally thought of as acyclic (i.e., feed-forward) structures. And yet, cyclic circuits can be combinational. Cycles sometimes occur ..."
Abstract - Cited by 13 (2 self) - Add to MetaCart
in designs synthesized from high-level descriptions. Feedback in such cases is carefully contrived, typically occurring when functional units are connected in a cyclic topology. Although the premise of cycles in combinational circuits has been accepted, and analysis techniques have been proposed, no one has

ABSTRACT STAND: Sanitization Tool for ANomaly Detection

by Gabriela F. Cretu, Angelos Stavrou, Salvatore J. Stolfo, Angelos D. Keromytis
"... heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic view of the deployment environment. Most realistic data sets are dirty; that is, they contain a number of attacks or anomalous events. The size of these high-quality training data ..."
Abstract - Add to MetaCart
heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic view of the deployment environment. Most realistic data sets are dirty; that is, they contain a number of attacks or anomalous events. The size of these high-quality training

Supervisors:

by Light Coal, Ryan M. Helmer, Prof D. Roekaerts, Dr. W. De Jong, Dr. O. Kroesen, Yash Joshi , 2015
"... This project could not have become a reality if not for the assistance of numerous people, who have, in one way or another, helped us through the many little steps along the way. First of all, I want to express my gratitude to the professors on the thesis committee, Prof. Dirk Roekaerts, Dr. Otto Kr ..."
Abstract - Add to MetaCart
undertake such an unusual project in the first place, and entertaining the various out-of-the-box ideas that we contrived along the way. From the beginning over a year ago, they were constantly willing to hear our ideas, all the while giving critical, guiding input to bring our ideas a bit closer

Algorithmic Aspects of Cyclic Combinational Circuit Synthesis

by unknown authors
"... Abstract — Digital circuits are called combinational if they are memoryless: they have outputs that depend only on the current values of the inputs. Combinational circuits are generally thought of as acyclic (i.e., feed-forward) structures. And yet, cyclic circuits can be combinational. Cycles somet ..."
Abstract - Add to MetaCart
sometimes occur in designs synthesized from high-level descriptions, as well as in bus-based designs [16]. Feedback in such cases is carefully contrived, typically occurring when functional units are connected in a cyclic topology. Although the premise of cycles in combinational circuits has been accepted

unknown title

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

ARTICLE What

by John D. Norton
"... can we learn about physical laws from the fact that we have memories only of the past? ..."
Abstract - Add to MetaCart
can we learn about physical laws from the fact that we have memories only of the past?

An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes

by Pierre-louis Cayrel, Sidi Mohamed, El Yousfi Alaoui, Gerhrad Hoffmann, Pascal Véron
"... Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently propos ..."
Abstract - Add to MetaCart
Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently proposed by Cayrel et al. in [14]. Our proposed scheme benefits of a performance gain as a result of the reduction in the soundness error from 2/3 for Stern’s scheme to 1/2 per round for the q-SD scheme. Our threshold ring signature scheme uses random linear codes over the field Fq, secure in the random oracle model and its security relies on the hardness of an error-correcting codes problem (namely the q-ary syndrome decoding problem). In this paper we also provide implementation results of the Aguilar et al. scheme and our proposal, this is the first efficient implementation of this type of code-based schemes.

On the Definitions of Cryptographic Security: Chosen-Ciphertext Attack Revisited

by unknown authors , 1999
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 13
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University