1
Table of Contents:
“... Tractable -- Streaming Algorithms for Submodular Function Maximization -- Multilinear Pseudorandom Functions -- Zero-Fixing Extractors for Sub-Logarithmic Entropy -- Interactive Proofs with Approximately Commuting Provers -- Popular Matchings with Two-Sided...”
Full text
Full text
2
3
Das, Swagatam.
2015
Table of Contents:
“... Rule Miners -- A Fuzzy Entropy based Multi-level Image Thresholding using Differential Evolution....”2015
Full text
4
Faloutsos, Michalis.
2014
Table of Contents:
“... Needle in the Haystack - Delay Based User Identification in Cellular Networks -- Understanding HTTP Traffic and CDN Behavior from the Eyes of a Mobile ISP -- On Understanding User Interests through Heterogeneous Data Sources -- Nightlights: Entropy-Based...”2014
Full text
5
Esparza, Javier.
2014
Table of Contents:
“... for Constructing Maximum Entropy Summary Trees -- Thorp Shuffling, Butterflies, and Non-Markovian Couplings.-Dynamic Complexity of Directed Reachability and Other Problems -- One Tile to Rule Them All: Simulating Any Tile Assembly System with a Single Universal Tile...”2014
Full text
6
Straccia, Umberto.
2014
Table of Contents:
“... Approach -- Computing Skyline from Evidential Data -- A Two-Level Approach to Maximum Entropy Model Computation for Relational Probabilistic Logic Based on Weighted Conditional Impacts: Solving Hidden-Semi-Markov-Mode Markov Decision Problems -- Probabilistic...”2014
Full text
7
Saeed, Khalid.
2014
Table of Contents:
“... Optimization with Basic Particle Performance Evaluation – An Initial Study -- Chaos Powered Grammatical Evolution -- Network Anomaly Detection Using Parameterized Entropy -- Universal Central Control of Home Appliances as an Expanding Element of the Smart Home...”2014
Full text
8
Klette, Reinhard.
2014
Table of Contents:
“... Based on Minimum Entropy -- Easy-to-Use and Accurate Calibration of RGB-D Cameras from Spheres -- Tree Species Classification Based on 3D Bark Texture Analysis -- Singular Vector Methods for Fundamental Matrix Computation -- Global Haar-Like Features: A New...”2014
Full text
9
Guyot, Vincent.
2013
Table of Contents:
“...-Party Authenticated Key Exchange Protocol Using One-Time Key.-Â Mechanisms to Locate Non-cooperative Transmitters in Wireless Networks.-Â Mantle: A Novel DOSN Leveraging Free Storage and Local Software.-Â Descriptional Entropy: Application to Security Software...”2013
Full text
10
Greenberg, Ariel M.
2013
Table of Contents:
“... Approach -- Detecting Anomalous Behaviors Using Structural Properties of Social Networks -- Measuring User Credibility in Social Media -- Financial Crisis, Omori’s Law, and Negative Entropy Flow -- Trust Metrics and Results for Social Media Analysis...”2013
Full text
11
Pathan, Mukaddim.
2013
Table of Contents:
“... -- Quantitative Model of Personnel Allocation Based on Information Entropy -- An Intelligent Complex Event Processing with D-S Evidence Theory in IT Centralized Monitoring -- Quantitative Dependability Assessment of Distributed Systems Subject to Variable Conditions....”2013
Full text
12
Ghorbani, Ali A.
2012
Table of Contents:
“... -- On Text Preprocessing for Opinion Mining Outside of Laboratory Environments -- Human Involvement in Designing an Information Quality Assessment Technique - Demonstrated in a Healthcare Setting -- On Applying Approximate Entropy to ECG Signals for Knowledge...”2012
Full text
13
Kotenko, Igor.
2012
Table of Contents:
“... Security -- A Study of Entropy Sources in Cloud Computers: Random Number -- Generation on Cloud Hosts -- Security Modeling of Grid Systems Using Petri Nets -- Using Graph Theory for Cloud System Security Modeling.....”2012
Full text
14
Park, James J.
2012
Table of Contents:
“... Defense System -- A New Approach for Detecting SMTPFA Based on Entropy Measurement -- A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services -- The Effects of Governmental Subsidy on the Quality of Education in Taiwan’s Private...”2012
Full text