Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung |
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, pp. 196-214, 1992, Springer, 3-540-57340-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
16 | David L. Dill |
Timing Assumptions and Verification of Finite-State Concurrent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Automatic Verification Methods for Finite State Systems ![In: Automatic Verification Methods for Finite State Systems, International Workshop, Grenoble, France, June 12-14, 1989, Proceedings, pp. 197-212, 1989, Springer, 3-540-52148-8. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
15 | Su Chang, Thomas E. Daniels |
P2P botnet detection using behavior clustering & statistical tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 23-30, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
machine learning, network security, anomaly detection |
15 | Achour Mostéfaoui |
What Agreement Problems Owe Michel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009. Proceedings, pp. 5, 2009, Springer, 978-3-642-04354-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 287-302, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation |
15 | Yi Deng 0002, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, Fourth International Computer Science Symposium in Russia, CSR 2009, Novosibirsk, Russia, August 18-23, 2009. Proceedings, pp. 80-91, 2009, Springer, 978-3-642-03350-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Zurab Khasidashvili, Gavriel Gavrielov, Tom Melham |
Assume-guarantee validation for STE properties within an SVA environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMCAD ![In: Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, FMCAD 2009, 15-18 November 2009, Austin, Texas, USA, pp. 108-115, 2009, IEEE, 978-1-4244-4966-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Emerson R. Murphy-Hill, Chris Parnin, Andrew P. Black |
How we refactor, and how we know it. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Proceedings, pp. 287-297, 2009, IEEE, 978-1-4244-3452-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Kosta Dosen, Zoran Petric |
Equality of proofs for linear equality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Arch. Math. Log. ![In: Arch. Math. Log. 47(6), pp. 549-565, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 03F07, 03F52, 03G30, 18C05, 18A40, 18D10, 03F05 |
15 | Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Hai H. Wang |
Specifying and Verifying Event-Based Fairness Enhanced Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFEM ![In: Formal Methods and Software Engineering, 10th International Conference on Formal Engineering Methods, ICFEM 2008, Kitakyushu-City, Japan, October 27-31, 2008. Proceedings, pp. 5-24, 2008, Springer, 978-3-540-88193-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Luca Benvenuti, Alberto Ferrari, Emanuele Mazzi, Alberto L. Sangiovanni-Vincentelli |
Contract-Based Design for Computation and Verification of a Closed-Loop Hybrid System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HSCC ![In: Hybrid Systems: Computation and Control, 11th International Workshop, HSCC 2008, St. Louis, MO, USA, April 22-24, 2008. Proceedings, pp. 58-71, 2008, Springer, 978-3-540-78928-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Martin Feilkas, Daniel Ratiu |
Ensuring Well-Behaved Usage of APIs through Syntactic Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPC ![In: The 16th IEEE International Conference on Program Comprehension, ICPC 2008, Amsterdam, The Netherlands, June 10-13, 2008, pp. 248-253, 2008, IEEE Computer Society, 978-0-7695-3176-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Kritsada Sriphaew, Hiroya Takamura, Manabu Okumura |
Cool Blog Identi?cation Using Topic-Based Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2008 IEEE / WIC / ACM International Conference on Web Intelligence, WI 2008, 9-12 December 2008, Sydney, NSW, Australia, Main Conference Proceedings, pp. 402-406, 2008, IEEE Computer Society, 978-0-7695-3496-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Flora P. McMartin, Brandon Muramatsu |
Use vs. access: design and use in educational digital libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2007, Vancouver, BC, Canada, June 18-23, 2007, Proceedings, pp. 492, 2007, ACM, 978-1-59593-644-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
digital libraries, collections, educational digital libraries, usage, NSDL |
15 | Juan M. Huerta |
A model for contact center analysis and simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference, WSC 2007, Washington, DC, USA, December 9-12, 2007, pp. 2259-2265, 2007, WSC, 1-4244-1306-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Douglas L. Vail, Manuela M. Veloso, John D. Lafferty |
Conditional random fields for activity recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA, May 14-18, 2007, pp. 235, 2007, IFAAMAS, 978-81-904262-7-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
conditional random fields (CRFs), hidden Markov models (HMMs), activity recognition |
15 | Siri-on Setamanit, Wayne W. Wakeland, David Raffo |
Exploring the Impact of Task Allocation Strategies for Global Software Development Using Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPW/ProSim ![In: Software Process Change, International Software Process Workshop and International Workshop on Software Process Simulation and Modeling, SPW/ProSim 2006, Shanghai, China, May 20-21, 2006, Proceedings, pp. 274-285, 2006, Springer, 3-540-34199-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Carrie Gates, Carol Taylor |
Challenging the anomaly detection paradigm: a provocative discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006, pp. 21-29, 2006, ACM, 978-1-59593-923-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, intrusion detection |
15 | Michael de Mare, Rebecca N. Wright |
Secure Set Membership Using 3Sat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 452-468, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Daniel Große, Rolf Drechsler |
Acceleration of SAT-Based Iterative Property Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHARME ![In: Correct Hardware Design and Verification Methods, 13th IFIP WG 10.5 Advanced Research Working Conference, CHARME 2005, Saarbrücken, Germany, October 3-6, 2005, Proceedings, pp. 349-353, 2005, Springer, 3-540-29105-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Rafael Pass |
Bounded-concurrent secure multi-party computation with a dishonest majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004, pp. 232-241, 2004, ACM, 1-58113-852-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition |
15 | Elena A. Erosheva, Stephen E. Fienberg |
Bayesian Mixed Membership Models for Soft Clustering and Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GfKl ![In: Classification - the Ubiquitous Challenge, Proceedings of the 28th Annual Conference of the Gesellschaft für Klassifikation e.V., University of Dortmund, March 9-11, 2004, pp. 11-26, 2004, Springer, 978-3-540-25677-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Sang Ho Lee, Kyu-Young Whang, Yang-Sae Moon, Wook-Shin Han, Il-Yeol Song |
Dynamic Buffer Allocation in Video-on-Demand Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 15(6), pp. 1535-1551, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
VOD systems, dynamic buffer allocation, buffer scheduling methods, multimedia systems |
15 | Andrew Rae, Daniel Jackson 0001, Prasad Ramanan, Jay Flanz, Didier Leyman |
Critical Feature Analysis of a Radiotherapy Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003, Proceedings, pp. 221-234, 2003, Springer, 3-540-20126-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Boaz Barak, Yehuda Lindell, Salil P. Vadhan |
Lower Bounds for Non-Black-Box Zero Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 44th Symposium on Foundations of Computer Science (FOCS 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings, pp. 384-393, 2003, IEEE Computer Society, 0-7695-2040-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Yann Loyer, Nicolas Spyratos |
Hypothesis-Founded Semantics for Datalog Programs with Negation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 2002, 27th International Symposium, MFCS 2002, Warsaw, Poland, August 26-30, 2002, Proceedings, pp. 483-494, 2002, Springer, 3-540-44040-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
semantics of logic programs, non-monotonic reasoning, hypothesis |
15 | Fernando Pedone |
Boosting System Performance with Optimistic Distributed Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 34(12), pp. 80-86, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Benjamin Geisler, Vu A. Ha, Peter Haddawy |
Modeling user preferences via theory refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI ![In: Proceedings of the 6th International Conference on Intelligent User Interfaces, IUI 2001, Santa Fe, NM, USA, January 14-17, 2001, pp. 87-90, 2001, ACM, 1-58113-325-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
neural networks, personalization, user modeling, decision theory |
15 | Sang Ho Lee, Kyu-Young Whang, Yang-Sae Moon, Il-Yeol Song |
Dynamic Buffer Allocation in Video-on-Demand Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2001 ACM SIGMOD international conference on Management of data, Santa Barbara, CA, USA, May 21-24, 2001, pp. 343-354, 2001, ACM, 1-58113-332-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Rosario Gennaro, Shai Halevi, Tal Rabin |
Secure Hash-and-Sign Signatures Without the Random Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 123-139, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Hash and Sign, Smooth Numbers, Digital Signatures, RSA, Random Oracle, Chameleon Hashing |
15 | John J. Kyaruzi, Jan van Katwijk |
Beyond Components-Connections-Constraints: Dealing with Software Architecture Difficulties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: The 14th IEEE International Conference on Automated Software Engineering, ASE 1999, Cocoa Beach, Florida, USA, 12-15 October 1999, pp. 235-242, 1999, IEEE Computer Society, 0-7695-0415-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
ontology, software architecture, formal methods, ADL |
15 | Radu Negulescu, Ad M. G. Peeters |
Verification of Speed-Dependences in Single-Rail Handshake Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASYNC ![In: 4th International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC '98), 30 March - 2 April 1998, San Diego, CA, USA, pp. 159-, 1998, IEEE Computer Society, 0-8186-8392-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
single-rail, isochronic forks, verification, timing, asynchronous circuits, progress, speed-independent circuits, process spaces, handshake circuits |
15 | Paul E. Black, Phillip J. Windley |
Autotically Synthesized Term Denotation Predicates: A Proof Aid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPHOLs ![In: Higher Order Logic Theorem Proving and Its Applications, 8th International Workshop, Aspen Grove, UT, USA, September 11-14, 1995, Proceedings, pp. 46-57, 1995, Springer, 3-540-60275-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
15 | Mohamed G. Gouda, Sanjoy Paul |
A wireless link protocol: design by refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 1995 International Conference on Network Protocols, ICNP 1995, November 7-10, 1995, Tokyo, Japan, pp. 192-200, 1995, IEEE Computer Society, 0-8186-7216-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
15 | Daniel R. Ries, Michael Stonebraker |
Locking Granularity Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 4(2), pp. 210-227, 1979. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
locking granulaity, locking hierarchies, multiple updates, concurrency, database management |
15 | Roger M. Firestone |
An analytic model for parallel computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1977 National Computer Conference, June 13-16, 1977, Dallas, Texas, USA, pp. 469-474, 1977, AFIPS Press, 978-1-4503-7914-4. The full citation details ...](Pics/full.jpeg) |
1977 |
DBLP DOI BibTeX RDF |
|
12 | Päivi Seppälä, Magdalena Malecka |
AI and discriminative decisions in recruitment: Challenging the core assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data Soc. ![In: Big Data Soc. 11(1), 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohsen Esmaeilbeigi, Meysam Cheraghi |
Hybrid kernel approach to improving the numerical stability of machine learning for parametric equations with Gaussian processes in the noisy and noise-free data assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eng. Comput. ![In: Eng. Comput. 40(2), pp. 761-794, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Matthew Abate, Mark Mote, Mehregan Dor, Corbin Klett, Sean Phillips, Kendra Lang, Panagiotis Tsiotras, Eric Feron, Samuel Coogan 0001 |
Run Time Assurance for Spacecraft Attitude Control Under Nondeterministic Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Control. Syst. Technol. ![In: IEEE Trans. Control. Syst. Technol. 32(3), pp. 862-873, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yusu Hong, Junhong Lin |
Revisiting Convergence of AdaGrad with Relaxed Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.13794, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yusu Hong, Junhong Lin |
On Convergence of Adam for Stochastic Optimization under Relaxed Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.03982, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ilias Diakonikolas, Daniel Kane 0001, Lisheng Ren, Yuxin Sun |
SQ Lower Bounds for Non-Gaussian Component Analysis with Weaker Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.04744, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Thomas S. Richardson 0001, James M. Robins |
Assumptions and Bounds in the Instrumental Variable Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.13758, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Eliad Tsfadia |
On Differentially Private Subspace Estimation Without Distributional Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.06465, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chen Yang 0007, Peng Liang 0001, Zinan Ma |
An exploratory study on automatic identification of assumptions in the development of deep learning frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.03653, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ashwin Daswani, Rohan Sawant, Najoung Kim |
Syn-QA2: Evaluating False Assumptions in Long-tail Questions with Synthetic QA Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.12145, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nilesh Vyas, Paulo Mendes 0001 |
Relaxing Trust Assumptions on Quantum Key Distribution Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.13136, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Brandon C. Collins, Shouhuai Xu, Philip N. Brown |
SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.13815, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Kaihong Zhang, Heqi Yin, Feng Liang, Jingbo Liu |
Minimax Optimality of Score-based Diffusion Models: Beyond the Density Lower Bound Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.15602, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Quang Dao, Aayush Jain |
Lossy Cryptography from Code-Based Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.03633, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aayush Jain, Huijia Lin, Amit Sahai |
Indistinguishability Obfuscation from Well-Founded Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 67(3), pp. 97-105, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mark Taylor, Helen Kennedy, Susan Oman |
Challenging assumptions about the relationship between awareness of and attitudes to data uses amongst the UK public. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Soc. ![In: Inf. Soc. 40(1), pp. 32-53, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Quang Dao, Aayush Jain |
Lossy Cryptography from Code-Based Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 175, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Helger Lipmaa, Roberto Parisella, Janno Siim |
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 173, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Intak Hwang, Jinyeong Seo, Yongsoo Song |
Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 306, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade |
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 94, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Jeroen van de Graaf, Arjen K. Lenstra |
Delphi: sharing assessments of cryptographic assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 157, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Sacha Servan-Schreiber |
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 58, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen |
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 184, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy |
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 445, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Jan Bobolz, Jesus Diaz, Markulf Kohlweiss |
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 42, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Yilei Chen, Xinyu Mao |
Universal Computational Extractors from Lattice Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 225, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Xin Wang, Li Lin, Yao Wang |
Stealth Address Schemes With Fast Retrievability Based On Subgroup Membership Assumptions Related To Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 67(4), pp. 1253-1264, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Roberta Cimorelli Belfiore, Andrea De Cosmo, Anna Lisa Ferrara |
Identity-Based Matchmaking Encryption from Standard Lattice Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS (2) ![In: Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II, pp. 163-188, 2024, Springer, 978-3-031-54772-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xinhui Liu, Zhenghao Chen, Luping Zhou, Dong Xu 0001, Wei Xi, Gairui Bai, Yihan Zhao, Jizhong Zhao |
UFDA: Universal Federated Domain Adaptation with Practical Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 14026-14034, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade |
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (4) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV, pp. 257-288, 2024, Springer, 978-3-031-57727-7. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Aikaterini Mitrokotsa, Sayantan Mukherjee, Mahdi Sedaghat, Daniel Slamanig, Jenit Tomy |
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 163-195, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Balthazar Bauer, Georg Fuchsbauer, Fabian Regen |
On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 3-36, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Romain Gay, Bogdan Ursu |
On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, pp. 74-104, 2024, Springer, 978-3-031-57720-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Helger Lipmaa, Roberto Parisella, Janno Siim |
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (6) ![In: Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VI, pp. 34-64, 2024, Springer, 978-3-031-58750-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen 0001 |
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (6) ![In: Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VI, pp. 90-119, 2024, Springer, 978-3-031-58750-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Anne-Kathrin Schmuck, K. S. Thejaswini, Irmak Saglam, Satya Prakash Nayak |
Solving Two-Player Games Under Progress Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMCAI (1) ![In: Verification, Model Checking, and Abstract Interpretation - 25th International Conference, VMCAI 2024, London, United Kingdom, January 15-16, 2024, Proceedings, Part I, pp. 208-231, 2024, Springer, 978-3-031-50523-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Achille O. R. Nazaret, Claudia Shi, David M. Blei |
On the Misspecification of Linear Assumptions in Synthetic Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISTATS ![In: International Conference on Artificial Intelligence and Statistics, 2-4 May 2024, Palau de Congressos, Valencia, Spain., pp. 3790-3798, 2024, PMLR. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Iosif Apostolakis, Zeynep G. Saribatur, Johannes Peter Wallner |
Abstracting Assumptions in Structured Argumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2024, Auckland, New Zealand, May 6-10, 2024, pp. 2132-2134, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Kuize Zhang |
Removing Two Fundamental Assumptions in Verifying Strong Periodic (D-)Detectability of Discrete-Event Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Control. Syst. Lett. ![In: IEEE Control. Syst. Lett. 7, pp. 1518-1523, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jean-François Biasse, Xavier Bonnetain, Elena Kirshanova, André Schrottenloher, Fang Song 0001 |
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 17(2), pp. 171-209, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Justin Grimmer, Dean Knox, Brandon M. Stewart |
Naive regression requires weaker assumptions than factor models to adjust for multiple cause confounding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Mach. Learn. Res. ![In: J. Mach. Learn. Res. 24, pp. 182:1-182:70, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Tetiana Gorbach, Xavier de Luna, Juha Karvanen, Ingeborg Waernbaum |
Contrasting Identifying Assumptions of Average Causal Effects: Robustness and Semiparametric Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Mach. Learn. Res. ![In: J. Mach. Learn. Res. 24, pp. 197:1-197:65, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Xiaoxi Jia, Christian Kanzow, Patrick Mehlitz |
Convergence Analysis of the Proximal Gradient Method in the Presence of the Kurdyka-Łojasiewicz Property Without Global Lipschitz Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Optim. ![In: SIAM J. Optim. 33(4), pp. 3038-3056, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Liting Mai, Shuping Yang, Yu Wang, Rui Li 0028 |
Impacts of Shape Assumptions on Z-R Relationship and Satellite Remote Sensing Clouds Based on Model Simulations and GPM Observations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 15(6), pp. 1556, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Janaka Alawatugoda 0001 |
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 7(1), pp. 1, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Gabriele Eichfelder, Lars Grüne, Lisa Krügel, Jonas Schießl |
Relaxed dissipativity assumptions and a simplified algorithm for multiobjective MPC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Optim. Appl. ![In: Comput. Optim. Appl. 86(3), pp. 1081-1116, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Clay Carper, Stone Olguin, Jarek Brown, Caylie Charlton, Mike Borowczak |
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 3(4), pp. 844-857, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Francis Mujjuni, Thomas R. Betts, Richard E. Blanchard |
Evaluation of Power Systems Resilience to Extreme Weather Events: A Review of Methods and Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 87279-87296, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Moslem Forouzesh, Farid Samsami Khodadad, Paeiz Azmi, Ali Kuhestani, Hossein Ahmadi |
Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(12), pp. 10160-10171, june15 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, Tal Moran |
Topology-Hiding Communication from Minimal Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 36(4), pp. 39, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Iqbal Shamsudheen, Christian Hennig |
Should We Test the Model Assumptions Before Running a Model-based Test? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Data Sci. Stat. Vis. ![In: J. Data Sci. Stat. Vis. 3(3), November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Axel Theorell, Jörg Stelling |
Assumptions on decision making and environment can yield multiple steady states in microbial community models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMC Bioinform. ![In: BMC Bioinform. 24-S(1), pp. 262, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Queralt Viladevall, Salvador Linares-Mustarós, Maria Antonia Huertas, Joan Carles Ferrer-Comalat |
Understanding the Axioms and Assumptions of Logical Mathematical Systems through Raster Images: Application to the Construction of a Likert Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Axioms ![In: Axioms 12(12), pp. 1064, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Noel Carroll, Kieran Conboy, Nik Rushdi Hassan, Thomas Hess, Iris A. Junglas, Lorraine Morgan |
Problematizing Assumptions on Digital Transformation Research in the Information Systems Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. Assoc. Inf. Syst. ![In: Commun. Assoc. Inf. Syst. 53, pp. 15, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Wentao Cao, Yaling Li, Qingzhao Yu |
Sensitivity analysis for assumptions of general mediation analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. Stat. Simul. Comput. ![In: Commun. Stat. Simul. Comput. 52(6), pp. 2453-2470, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
Short attribute-based signatures for arbitrary Turing machines from standard assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 91(5), pp. 1845-1872, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yanwei Zhou, Bo Yang 0003, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu 0001 |
Leakage-resilient identity-based cryptography from minimal assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 91(11), pp. 3757-3801, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Maarten C. Vonk, Ninoslav Malekovic, Thomas Bäck, Anna V. Kononova |
Disentangling causality: assumptions in causal discovery and inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 56(9), pp. 10613-10649, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Leonid Barenboim, Harel Levin |
Secured distributed algorithms without hardness assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Parallel Distributed Comput. ![In: J. Parallel Distributed Comput. 171, pp. 130-140, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jiaxu Peng, Jungpil Hahn, Ke-Wei Huang |
Handling Missing Values in Information Systems Research: A Review of Methods and Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Res. ![In: Inf. Syst. Res. 34(1), pp. 5-26, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Dirk Tasche |
Invariance assumptions for class distribution estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.17225, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Amit Daniely, Nathan Srebro, Gal Vardi |
Efficiently Learning Neural Networks: What Assumptions May Suffice? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.07426, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Jihyo Kim, Jeonghyeon Kim, Sangheum Hwang |
Deep Active Learning with Contrastive Learning Under Realistic Data Pool Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.14433, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Daniel Barzilai, Ohad Shamir |
Generalization in Kernel Regression Under Realistic Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.15995, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|