Sciweavers

402 search results - page 58 / 81
» Cryptosystems using Linear Groups
Sort
View
FOCS
2010
IEEE
15 years 1 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
CVPR
2011
IEEE
14 years 7 months ago
Max-margin Clustering: Detecting Margins from Projections of Points on Lines
Given a unlabelled set of points X ∈ RN belonging to k groups, we propose a method to identify cluster assignments that provides maximum separating margin among the clusters. We...
Raghuraman Gopalan, Jagan Sankaranarayanan
148
Voted
ICDAR
2011
IEEE
14 years 3 months ago
Objective Function Design for MCE-Based Combination of On-line and Off-line Character Recognizers for On-line Handwritten Japane
—This paper describes effective object function design for combining on-line and off-line character recognizers for on-line handwritten Japanese text recognition. We combine on-l...
Bilan Zhu, Jinfeng Gao, Masaki Nakagawa
129
Voted
RECOMB
2007
Springer
16 years 3 months ago
Design of Compact, Universal DNA Microarrays for Protein Binding Microarray Experiments
Our group has recently developed a compact, universal protein binding microarray (PBM) that can be used to determine the binding preferences of transcription factors (TFs) [1]. Thi...
Anthony A. Philippakis, Aaron M. Qureshi, Michael ...
136
Voted
ICASSP
2009
IEEE
15 years 10 months ago
Sparse decomposition of mixed audio signals by basis pursuit with autoregressive models
We develop a framework to detect when certain sounds are present in a mixed audio signal. We focus on the regime where out of a large number of possible sounds, a small but unknow...
Youngmin Cho, Lawrence K. Saul