Sciweavers

3643 search results - page 97 / 729
» Learning Submodular Functions
Sort
View
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
JMLR
2012
13 years 4 months ago
Learning Low-order Models for Enforcing High-order Statistics
Models such as pairwise conditional random fields (CRFs) are extremely popular in computer vision and various other machine learning disciplines. However, they have limited expre...
Patrick Pletscher, Pushmeet Kohli
BLISS
2008
IEEE
15 years 9 months ago
Effecting an Improvement to the Fitness Function. How to Evolve a More Identifiable Face
Constructing the face of a criminal from the selection of individual facial parts is a hard task. We have been working on a new system called EvoFIT that involves the selection an...
Charlie D. Frowd, Joanne Park, Alex H. McIntyre, V...
ICANN
2010
Springer
15 years 13 days ago
Dynamics and Function of a CA1 Model of the Hippocampus during Theta and Ripples
The hippocampus is known to be involved in spatial learning in rats. Spatial learning involves the encoding and replay of temporally sequenced spatial information. Temporally seque...
Vassilis Cutsuridis, Michael E. Hasselmo
EUROCRYPT
2000
Springer
15 years 6 months ago
Exposure-Resilient Functions and All-or-Nothing Transforms
Abstract. We study the problem of partial key exposure. Standard cryptographic definitions and constructions do not guarantee any security even if a tiny fraction of the secret key...
Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kus...