Sciweavers

872 search results - page 126 / 175
» Extreme lower probabilities
Sort
View
EUROCRYPT
2003
Springer
15 years 5 months ago
Algebraic Attacks on Stream Ciphers with Linear Feedback
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attack...
Nicolas Courtois, Willi Meier
PAKDD
2009
ACM
149views Data Mining» more  PAKDD 2009»
15 years 4 months ago
A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data
Detecting outliers which are grossly different from or inconsistent with the remaining dataset is a major challenge in real-world KDD applications. Existing outlier detection met...
Ke Zhang, Marcus Hutter, Huidong Jin
ITCC
2000
IEEE
15 years 4 months ago
Projection-Based Multiuser Receiver over Frequency Selective Channels
In multiuser communication, the receiver’s performance is degraded by multiuser interference (MUI) as well as multipath distortions. This paper aims at elimination of these side...
Zhengyuan (Daniel) Xu
ECCV
2000
Springer
15 years 4 months ago
How Does CONDENSATION Behave with a Finite Number of Samples?
Abstract. Condensation is a popular algorithm for sequential inference that resamples a sampled representation of the posterior. The algorithm is known to be asymptotically correct...
Oliver D. King, David A. Forsyth
CIAC
1994
Springer
148views Algorithms» more  CIAC 1994»
15 years 4 months ago
Efficient Reorganization of Binary Search Trees
We consider the problem of maintaining a binary search tree (BST) that minimizes the average access cost needed to satisfy randomly generated requests. We analyze scenarios in whi...
Micha Hofri, Hadas Shachnai