نتایج جستجو برای: corrupted data

تعداد نتایج: 2413882  

1995
Kwong Bor Ng Paul B. Kantor

We report on several experiments in using data fusion to improve information retrieval, and in approximate text and 5-gram mathcing methods for retrieval of corrupted text, in the TREC context.

Journal: :Applied and Computational Harmonic Analysis 2021

In this paper, we consider (random) sampling of signals concentrated on a bounded Corkscrew domain ? metric measure space, and reconstructing approximately from their (un)corrupted data taken set contained in ?. We establish weighted stability bi-Lipschitz type for scheme the reproducing kernel space. The provides weak robustness to scheme, however due nonconvexity signals, it does not imply un...

Journal: :IACR Cryptology ePrint Archive 2011
Martin Hirt Christoph Lucas Ueli Maurer Dominik Raub

The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way. For this purpose, a fixed set of n parties runs a protocol that tolerates an adversary corrupting a subset of the participating parties, and still preserves certain security guarantees. Most MPC protocols provide security guarantees in an all-or-nothing fashion: Ei...

Journal: :IACR Cryptology ePrint Archive 2002
Matthias Fitzi Martin Hirt Thomas Holenstein Jürg Wullschleger

A broadcast protocol allows a sender to distribute a value among a set of players such that it is guaranteed that all players receive the same value (consistency), and if the sender is honest, then all players receive the sender’s value (validity). Classical broadcast protocols for n players provide security with respect to a fixed threshold t < n/3, where both consistency and validity are guar...

Journal: :CoRR 2013
Yudong Chen Constantine Caramanis Shie Mannor

In this paper we consider high dimensional sparse regression, and develop strategies able to deal with arbitrary – possibly, severe or coordinated – errors in the covariance matrix X . These may come from corrupted data, persistent experimental errors, or malicious respondents in surveys/recommender systems, etc. Such non-stochastic error-invariables problems are notoriously difficult to treat,...

Journal: :IEEE Control Systems Letters 2021

This letter considers the problem of multi-agent distributed linear regression in presence system noises. In this problem, comprises multiple agents wherein each agent locally observes a set data points, and agents' goal is to compute model that best fits collective points observed by all agents. We consider server-based architecture where interact with common server solve problem; however, can...

Journal: :روش های عددی در مهندسی (استقلال) 0
مسعود سبحانی و احمدرضا تابش m. sobhani and a. a. tabesh

in this paper, a new algorithm for system identification based on frequency response is presented. in this method, given a set of magnitudes and phases of the system transfer function in a set of discrete frequencies, a system of linear equations is derived which has a unique and exact solution for the coefficients of the transfer function provided that the data is noise-free and the degrees of...

2004
Thomas Holenstein

Broadcast, also called Byzantine Agreement, is a multi-party computation primitive where a dealer sends his input value to a group of players. All players must agree on the same output value, even if a part of these players is corrupted by an adversary. Furthermore, when the dealer is not corrupted, the output value of the correct players must be the input value of the dealer. It has been prove...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید