Sciweavers

1078 search results - page 177 / 216
» Analyzing DB2 Data Sharing Performance Problems
Sort
View
JOC
2008
92views more  JOC 2008»
14 years 9 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 1 months ago
Gigapixel Binary Sensing: Image Acquisition Using Oversampled One-Bit Poisson Statistics
We study a new gigapixel image sensor that is reminiscent of traditional photographic film. Each pixel in the sensor has a binary response, giving only a one-bit quantized measur...
Feng Yang, Yue M. Lu, Luciano Sbaiz, Martin Vetter...
CVPR
2005
IEEE
15 years 11 months ago
Subspace Analysis Using Random Mixture Models
In [1], three popular subspace face recognition methods, PCA, Bayes, and LDA were analyzed under the same framework and an unified subspace analysis was proposed. However, since t...
Xiaogang Wang, Xiaoou Tang
CIKM
2010
Springer
14 years 8 months ago
Demographic information flows
In advertising and content relevancy prediction it is important to understand whether, over time, information that reaches one demographic group spreads to others. In this paper w...
Ingmar Weber, Alejandro Jaimes
ICASSP
2009
IEEE
15 years 4 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu