Sciweavers

109 search results - page 1 / 22
» On the Weakenesses of Correlation
Sort
View
IJON
2008
93views more  IJON 2008»
13 years 4 months ago
Morphologically constrained ICA for extracting weak temporally correlated signals
Recently the constrained ICA (cICA) algorithm has been widely applied to many applications. But a crucial problem to the algorithm is how to design a reference signal in advance, ...
Zhi-Lin Zhang
CHINAF
2008
105views more  CHINAF 2008»
13 years 4 months ago
Fast correlation attack on stream cipher ABC v3
ABC v3 is a stream cipher proposed as a candidate to ECRYPT Estream Project which enters the second evaluation phase. Its key length is 128 bits. In this paper, We show that, ther...
Haina Zhang, Lin Li, Xiaoyun Wang
FSE
2004
Springer
115views Cryptology» more  FSE 2004»
13 years 10 months ago
Correlation Attacks Using a New Class of Weak Feedback Polynomials
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually ...
Håkan Englund, Martin Hell, Thomas Johansson
CORR
2011
Springer
201views Education» more  CORR 2011»
12 years 8 months ago
On the Weakenesses of Correlation
The correlation of the result lists provided by search engines is fundamental and it has deep and multidisciplinary ramifications. Here, we present automatic and unsupervised met...
Paolo D'Alberto, Ali Dasdan
ICPR
2006
IEEE
14 years 5 months ago
A New Objective Function for Ensemble Selection in Random Subspaces
Most works based on diversity suggest that there exists only weak correlation between diversity and ensemble accuracy. We show that by combining the diversities with the classifica...
Albert Hung-Ren Ko, Robert Sabourin, Alceu de Souz...