Chernoff

Results: 111



#Item
41Bounds on surmising remixed keys Daniel R. L. Brown∗ Rough draft May 7, 2015  Abstract

Bounds on surmising remixed keys Daniel R. L. Brown∗ Rough draft May 7, 2015 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 15:21:41
42Tight Bounds on Information Dissemination ∗ in Sparse Mobile Networks Alberto Pettarin  Andrea Pietracaprina

Tight Bounds on Information Dissemination ∗ in Sparse Mobile Networks Alberto Pettarin Andrea Pietracaprina

Add to Reading List

Source URL: www.albertopettarin.it

Language: English - Date: 2013-05-08 06:41:05
43Risk Parity Portfolio vs. Other Asset Allocation Heuristic Portfolios The Journal of Investing:Downloaded from www.iijournals.com by Joel Chernoff onIt is illegal to make unauthorized copies

Risk Parity Portfolio vs. Other Asset Allocation Heuristic Portfolios The Journal of Investing:Downloaded from www.iijournals.com by Joel Chernoff onIt is illegal to make unauthorized copies

Add to Reading List

Source URL: www.jasonhsu.org

Language: English - Date: 2011-12-13 12:51:59
44

PDF Document

Add to Reading List

Source URL: dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:46
45On Hierarchical Routing in Doubling Metrics Hubert T-H. Chan Anupam Gupta  Bruce M. Maggs

On Hierarchical Routing in Doubling Metrics Hubert T-H. Chan Anupam Gupta Bruce M. Maggs

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2005-02-08 15:52:04
46Ultra-Low-Dimensional Embeddings for Doubling Metrics T-H. Hubert Chan∗ Anupam Gupta†  Abstract

Ultra-Low-Dimensional Embeddings for Doubling Metrics T-H. Hubert Chan∗ Anupam Gupta† Abstract

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2007-10-10 14:08:55
47A Survey on Multivariate Data Visualization  Winnie Wing-Yi Chan Department of Computer Science and Engineering Hong Kong University of Science and Technology

A Survey on Multivariate Data Visualization Winnie Wing-Yi Chan Department of Computer Science and Engineering Hong Kong University of Science and Technology

Add to Reading List

Source URL: chem-eng.utoronto.ca

Language: English - Date: 2013-02-14 17:51:00
482014 IEEE Annual Symposium on Foundations of Computer Science  Threesomes, Degenerates, and Love Triangles Allan Grønlund  Seth Pettie

2014 IEEE Annual Symposium on Foundations of Computer Science Threesomes, Degenerates, and Love Triangles Allan Grønlund Seth Pettie

Add to Reading List

Source URL: madalgo.au.dk

Language: English - Date: 2015-04-22 04:53:32
49On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:20:25
50An Improved Data Stream Summary: The Count-Min Sketch and its Applications Graham Cormode a,∗,? , S. Muthukrishnan b,1 a Center  for Discrete Mathematics and Computer Science (DIMACS), Rutgers University,

An Improved Data Stream Summary: The Count-Min Sketch and its Applications Graham Cormode a,∗,? , S. Muthukrishnan b,1 a Center for Discrete Mathematics and Computer Science (DIMACS), Rutgers University,

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-10 13:28:10