Sciweavers

1518 search results - page 108 / 304
» Cryptographic Test Correction
Sort
View
138
Voted
ASIACRYPT
2010
Springer
15 years 1 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
142
Voted
JOC
2011
104views more  JOC 2011»
14 years 6 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
153
Voted
KDD
2008
ACM
181views Data Mining» more  KDD 2008»
16 years 4 months ago
Fastanova: an efficient algorithm for genome-wide association study
Studying the association between quantitative phenotype (such as height or weight) and single nucleotide polymorphisms (SNPs) is an important problem in biology. To understand und...
Xiang Zhang, Fei Zou, Wei Wang 0010
151
Voted
LLL
1999
Springer
15 years 8 months ago
Learning to Lemmatise Slovene Words
Abstract. Automatic lemmatisation is a core application for many language processing tasks. In inflectionally rich languages, such as Slovene, assigning the correct lemma to each ...
Saso Dzeroski, Tomaz Erjavec
ICML
2005
IEEE
16 years 4 months ago
A martingale framework for concept change detection in time-varying data streams
In a data streaming setting, data points are observed one by one. The concepts to be learned from the data points may change infinitely often as the data is streaming. In this pap...
Shen-Shyang Ho