Sciweavers

2434 search results - page 433 / 487
» Algorithmic Randomness of Closed Sets
Sort
View
VLSI
2010
Springer
14 years 7 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...
175
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...
ESOP
2011
Springer
14 years 4 months ago
Measure Transformer Semantics for Bayesian Machine Learning
Abstract. The Bayesian approach to machine learning amounts to inferring posterior distributions of random variables from a probabilistic model of how the variables are related (th...
Johannes Borgström, Andrew D. Gordon, Michael...
202
Voted
EMMCVPR
2011
Springer
14 years 6 days ago
Branch and Bound Strategies for Non-maximal Suppression in Object Detection
In this work, we are concerned with the detection of multiple objects in an image. We demonstrate that typically applied objectives have the structure of a random field model, but...
Matthew B. Blaschko
99
Voted
IACR
2011
94views more  IACR 2011»
14 years 3 days ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...