From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Distributed Topic Modeling with Provable Guarantees., , , и . AISTATS, том 33 из JMLR Workshop and Conference Proceedings, стр. 167-175. JMLR.org, (2014)An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography., , , , , , и . Information Hiding, том 3727 из Lecture Notes in Computer Science, стр. 327-341. Springer, (2005)Necessary and Sufficient Conditions and a Provably Efficient Algorithm for Separable Topic Discovery., , и . CoRR, (2015)Privacy-Preserving Adversarial Networks., , и . CoRR, (2017)Delayed Sequential Coding of Correlated Sources, , и . CoRR, (2007)Information-Theoretically Secure Three-Party Computation with One Active Adversary, , и . CoRR, (2012)Secure Two-Party Sampling Primitives are either Useless or Complete., , и . CoRR, (2014)Towards a theory for video coding using distributed compression principles., , и . ICIP (2), стр. 687-690. IEEE, (2003)On unconditionally secure multiparty computation for realizing correlated equilibria in games., , и . GlobalSIP, стр. 241-244. IEEE, (2013)Bootstrapped oblivious transfer and secure two-party function computation., и . ISIT, стр. 1303-1307. IEEE, (2009)