Provable

Results: 110



#Item
21

Spectral clustering is a well-known way to partition a graph or network into clusters or communities with provable guarantees on the quality of the clusters. This guarantee is known as the Cheeger inequality and it holds

Add to Reading List

Source URL: mmds-data.org

- Date: 2016-06-23 15:50:48
    22Digital rights / Human rights / John M. Abowd / Privacy / Internet privacy / Gregory Abowd

    The Cost of Provable Privacy: A Case Study on Linked Employer-Employee Data∗ Samuel Haney1 , Ashwin Machanavajjhala1 , John M. Abowd2 , Matthew Graham3 , Mark Kutzbach3 , and Lars Vilhuber2 1

    Add to Reading List

    Source URL: tpdp16.cse.buffalo.edu

    Language: English - Date: 2016-06-22 09:46:32
    23

    A list of inept businesses and organisations and why. A warning for those who are not aware of their failings. This is just my provable experiences. Yahoo. This company is now so in league with the American security agen

    Add to Reading List

    Source URL: aromamedical.org

    Language: English - Date: 2015-09-01 11:05:09
      24

      Provable Tensor Methods for Learning Mixtures of Generalized Linear Models Hanie Sedghi Allen Institute for AI⇤

      Add to Reading List

      Source URL: www-scf.usc.edu

      Language: English - Date: 2016-04-19 03:20:08
        25

        Provable Bayesian Inference via Particle Mirror Descent Bo Dai Georgia Tech

        Add to Reading List

        Source URL: jmlr.org

        Language: English - Date: 2016-06-06 23:29:33
          26Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol

          A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

          Add to Reading List

          Source URL: software.imdea.org

          Language: English - Date: 2014-07-17 09:25:52
          27

          Scavenging  for  Anonymity   with  BlogDrop   Henry  Corrigan-­‐Gibbs   Bryan  Ford   Yale  University   Provable  Privacy  Workshop  

          Add to Reading List

          Source URL: www.henrycg.com

          Language: English - Date: 2015-03-30 02:10:05
            28Cryptography / Abstract algebra / Algebra / Computational hardness assumptions / Finite fields / DiffieHellman problem / Group theory / Elliptic curve cryptography / Provable security / Whitfield Diffie / DiffieHellman key exchange / Elliptic curve

            Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields

            Add to Reading List

            Source URL: 2010.eccworkshop.org

            Language: English - Date: 2010-10-25 19:46:00
            29

            Another Look at “Provable Security” Neal Koblitz Dept. of Mathematics, BoxUniv. of Washington, Seattle, WAU.S.A.

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2005-05-04 15:59:05
              30

              Provable Data Plane Connectivity with Local Fast Failover Introducing OpenFlow Graph Algorithms Michael Borokhovich (Ben Gurion Uni, Israel) Liron Schiff (Tel Aviv Uni, Israel)

              Add to Reading List

              Source URL: conferences.sigcomm.org

              Language: English - Date: 2014-09-01 23:12:57
                UPDATE