نتایج جستجو برای: phan privacy model
تعداد نتایج: 2140719 فیلتر نتایج به سال:
Topic models are a popular method for modeling the term frequency occurrences in documents. The fitted model allows to better estimate the similarity between documents as well as between a set of specified keywords using an additional layer of latent variables which are referred to as topics. The R package topicmodels provides basic infrastructure for fitting topic models based on data structur...
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
In this paper, we consider an exceptional study of differentially private stochastic gradient descent (SGD) algorithms in the convex optimization (SCO). The majority existing literature requires that losses have additional assumptions, such as loss functions with Lipschitz, smooth and strongly convex, uniformly bounded model parameters, or focus on Euclidean (i.e. <math xmlns="http://www.w3.org...
We discuss self-similar solutions for jet breakup for a family of models of nonNewtonian fluids which includes the Phan-Thien Tanner model. The constitutive law is given by Tt + (v · ∇)T− (∇v)T−T(∇v)T + κT +ν(trT)a−1T = μ(∇v + (∇v)T ), (1) where a > 1. For a = 2, a recent paper establishes the existence of a similarity solution for surface tension driven jet breakup. In this paper, we show that...
Received on 12 December 2014, published on 16 December 2014 Copyright © 2014 Phan Cong Vinh, licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited. doi: 10.4108/ca...
Traitor tracing is needed because some users in broadcast encryption system may give out their decryption keys to construct pirate decoders. Many codes based traitor tracing scheme were proposed. However, as stated by Billet and Phan in ICITS 2008, they lack of revocation ability. We provide a generic scheme of codes based traitor tracing with revocation ability, based on ciphertextpolicy attri...
This paper presents an algorithm, which improves the probability of success for simple swarm robots implementing an extended version of the leaf curling task – one part of the nest building activity of weaver ants [Phan and Russell, 2009, 2010]. The robots are required to have only very basic sensing abilities, and are allowed to transfer information using sematectonic stigmergy – a cue-based i...
Differential privacy is a strong privacy notion based on indistinguishability of outputs of two neighboring datasets, which represent two states of one’s information is within or without of a dataset. However, when facing dependent records, the representation would lose its foundation. Motivated by the observation, we introduce a variant of differential privacy notion based on the influence of ...
The economic implications of network topologies are studied via a monopolist’s model of market networks originally proposed by Phan, et al. (2003). By embedding the market into a larger collection of network topologies, in particular, a class of scale-free networks, we extend the early analysis built upon a class of ring networks. To facilitate the study of the impacts of network topologies upo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید