Sciweavers

4245 search results - page 17 / 849
» Input Modeling
Sort
View
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
77
Voted
ICTAI
2003
IEEE
15 years 5 months ago
Transportation Bid Analysis Optimization with Shipper Input
This paper extends carrier assignment models used in bid analysis for transportation procurement to incorporate shipper business considerations. These include restricting carrier ...
Yunsong Guo, Andrew Lim, Brian Rodrigues
NIPS
1994
15 years 1 months ago
An Input Output HMM Architecture
We introduce a recurrent architecture having a modular structure and we formulate a training procedure based on the EM algorithm. The resulting model has similarities to hidden Ma...
Yoshua Bengio, Paolo Frasconi
CDC
2009
IEEE
156views Control Systems» more  CDC 2009»
15 years 3 months ago
Input design using Markov chains for system identification
This paper studies the input design problem for system identification where time domain constraints have to be considered. A finite Markov chain is used to model the input of the s...
Chiara Brighenti, Bo Wahlberg, Cristian R. Rojas
CCS
2007
ACM
15 years 6 months ago
Security under key-dependent inputs
In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by B...
Shai Halevi, Hugo Krawczyk