Sciweavers

1541 search results - page 136 / 309
» Analysis of Random Noise and Random Walk Algorithms
Sort
View
CHES
1999
Springer
140views Cryptology» more  CHES 1999»
15 years 9 months ago
Power Analysis Attacks of Modular Exponentiation in Smartcards
Abstract. Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to ...
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
ISBI
2004
IEEE
16 years 5 months ago
Speckle Reduction on Ultrasound Image by Variational Methods and Adaptive Lagrangian Multipliers
Ultrasound images are corrupted by a multiplicative noise, the speckle, which makes high level analysis difficult. Within each resolution cell a number of elementary scatterers re...
Arnaud Ogier, Pierre Hellier, Christian Barillot
3DIM
2005
IEEE
15 years 10 months ago
A MRF Formulation for Coded Structured Light
Multimedia projectors and cameras make possible the use of structured light to solve problems such as 3D reconstruction, disparity map computation and camera or projector calibrat...
Jean-Philippe Tardif, Sébastien Roy
CORR
2010
Springer
134views Education» more  CORR 2010»
15 years 3 months ago
The LASSO risk for gaussian matrices
We consider the problem of learning a coefficient vector x0 ∈ RN from noisy linear observation y = Ax0 + w ∈ Rn . In many contexts (ranging from model selection to image proce...
Mohsen Bayati, Andrea Montanari
ICML
2003
IEEE
16 years 5 months ago
Bayes Meets Bellman: The Gaussian Process Approach to Temporal Difference Learning
We present a novel Bayesian approach to the problem of value function estimation in continuous state spaces. We define a probabilistic generative model for the value function by i...
Yaakov Engel, Shie Mannor, Ron Meir