Several Proofs of Security for a Tokenization Algorithm.
Riccardo LongoMassimiliano SalaRiccardo AragonaPublished in: CoRR (2016)
Keyphrases
- np hard
- worst case
- learning algorithm
- preprocessing
- improved algorithm
- computational complexity
- segmentation algorithm
- significant improvement
- cost function
- matching algorithm
- optimal solution
- probabilistic model
- detection algorithm
- optimization algorithm
- times faster
- recognition algorithm
- computationally efficient
- dynamic programming
- k means
- similarity measure
- expectation maximization
- input data
- computational cost
- experimental evaluation
- search space
- convergence rate
- objective function
- network security