Sciweavers

7228 search results - page 101 / 1446
» From Algorithmic to Subjective Randomness
Sort
View
CIARP
2009
Springer
15 years 1 months ago
K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation
In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. The stages that comprise the approach are training-enr...
H. A. Garcia-Baleon, Vicente Alarcón Aquino...
COMPGEOM
2010
ACM
15 years 8 months ago
On degrees in random triangulations of point sets
We study the expected number of interior vertices of degree i in a triangulation of a point set S, drawn uniformly at random from the set of all triangulations of S, and derive va...
Micha Sharir, Adam Sheffer, Emo Welzl
118
Voted
DSN
2007
IEEE
15 years 9 months ago
R-Sentry: Providing Continuous Sensor Services against Random Node Failures
The success of sensor-driven applications is reliant on whether a steady stream of data can be provided by the underlying system. This need, however, poses great challenges to sen...
Shengchao Yu, Yanyong Zhang
140
Voted
ISCA
2010
IEEE
284views Hardware» more  ISCA 2010»
15 years 8 months ago
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address
Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and...
Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee
KDD
2006
ACM
147views Data Mining» more  KDD 2006»
16 years 3 months ago
Summarizing itemset patterns using probabilistic models
In this paper, we propose a novel probabilistic approach to summarize frequent itemset patterns. Such techniques are useful for summarization, post-processing, and end-user interp...
Chao Wang, Srinivasan Parthasarathy