Sciweavers

324 search results - page 65 / 65
» Guessing based on length functions
Sort
View
CCS
2010
ACM
13 years 1 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
SIAMAM
2011
13 years 4 days ago
Modeling and Design Optimization of a Resonant Optothermoacoustic Trace Gas Sensor
Trace gas sensors that are compact and portable are being deployed for use in a variety of applications including disease diagnosis via breath analysis, monitoring of atmospheric p...
Noemi Petra, John Zweck, Susan E. Minkoff, Anatoli...
ICASSP
2011
IEEE
12 years 9 months ago
Use of VTL-wise models in feature-mapping framework to achieve performance of multiple-background models in speaker verification
Recently, Multiple Background Models (M-BMs) [1, 2] have been shown to be useful in speaker verification, where the M-BMs are formed based on different Vocal Tract Lengths (VTLs)...
Achintya Kumar Sarkar, Srinivasan Umesh
BMCBI
2006
110views more  BMCBI 2006»
13 years 5 months ago
CpGcluster: a distance-based algorithm for CpG-island detection
Background: Despite their involvement in the regulation of gene expression and their importance as genomic markers for promoter prediction, no objective standard exists for defini...
Michael Hackenberg, Christopher Previti, Pedro Lui...