Sciweavers

5153 search results - page 379 / 1031
» Introduction to Randomized Algorithms
Sort
View
ICMCS
2006
IEEE
133views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Captcha Based on the Human Visual Systems Masking Characteristics
In this paper, a CAPTCHA is presented based on the masking characteristics of the Human Visual System (HVS). Knowing that noise can be masked by high activity regions and showing ...
Rony Ferzli, Rida A. Bazzi, Lina J. Karam
CRYPTO
2004
Springer
139views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
How to Compress Rabin Ciphertexts and Signatures (and More)
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
Craig Gentry
GECCO
2004
Springer
15 years 10 months ago
On the Choice of the Population Size
Abstract. Evolutionary Algorithms (EAs) are population-based randomized optimizers often solving problems quite successfully. Here, the focus is on the possible effects of changin...
Tobias Storch
AC
2003
Springer
15 years 10 months ago
Concentration Inequalities
Concentration inequalities deal with deviations of functions of independent random variables from their expectation. In the last decade new tools have been introduced making it pos...
Stéphane Boucheron, Gábor Lugosi, Ol...
ASIAN
2003
Springer
170views Algorithms» more  ASIAN 2003»
15 years 10 months ago
Model Checking Probabilistic Distributed Systems
Protocols for distributed systems make often use of random transitions to achieve a common goal. A popular example are randomized leader election protocols. We introduce probabilis...
Benedikt Bollig, Martin Leucker