Sciweavers

4377 search results - page 875 / 876
» Mass problems and randomness
Sort
View
IACR
2011
132views more  IACR 2011»
12 years 5 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
ICC
2011
IEEE
215views Communications» more  ICC 2011»
12 years 5 months ago
Optimal Packet Scheduling in a Broadcast Channel with an Energy Harvesting Transmitter
—In this paper, we investigate the transmission completion time minimization problem in a two-user additive white Gaussian noise (AWGN) broadcast channel, where the transmitter i...
Jing Yang, Omur Ozel, Sennur Ulukus
CVPR
2012
IEEE
11 years 8 months ago
Light field denoising, light field superresolution and stereo camera based refocussing using a GMM light field patch prior
With the recent availability of commercial light field cameras, we can foresee a future in which light field signals will be as common place as images. Hence, there is an immine...
Kaushik Mitra, Ashok Veeraraghavan
RECOMB
2012
Springer
11 years 8 months ago
Recovering the Tree-Like Trend of Evolution Despite Extensive Lateral Genetic Transfer: A Probabilistic Analysis
Abstract. Lateral gene transfer (LGT) is a common mechanism of nonvertical evolution where genetic material is transferred between two more or less distantly related organisms. It ...
Sebastien Roch, Sagi Snir
FCT
2009
Springer
14 years 9 days ago
Competitive Group Testing and Learning Hidden Vertex Covers with Minimum Adaptivity
Suppose that we are given a set of n elements d of which are “defective”. A group test can check for any subset, called a pool, whether it contains a defective. It is well know...
Peter Damaschke, Azam Sheikh Muhammad