Sciweavers

316 search results - page 42 / 64
» On Approximate Majority and Probabilistic Time
Sort
View
99
Voted
ICIP
2002
IEEE
15 years 11 months ago
Effects of channel delays on underflow events of compressed video over the Internet
This paper presents an extensive statistical study and analysis of the effects of channel delays in the current (best-effort) Internet on underflow events in MPEG-4 video streamin...
Dmitri Loguinov, Hayder Radha
SODA
2010
ACM
704views Algorithms» more  SODA 2010»
15 years 7 months ago
A locality-sensitive hash for real vectors
We present a simple and practical algorithm for the c-approximate near neighbor problem (c-NN): given n points P Rd and radius R, build a data structure which, given q Rd , can ...
Tyler Neylon
COCO
2005
Springer
130views Algorithms» more  COCO 2005»
14 years 11 months ago
Pseudorandom Bits for Constant Depth Circuits with Few Arbitrary Symmetric Gates
We exhibit an explicitly computable ‘pseudorandom’ generator stretching l bits into m(l) = lΩ(log l) bits that look random to constant-depth circuits of size m(l) with log m...
Emanuele Viola
83
Voted
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 1 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
SIGMOD
2008
ACM
90views Database» more  SIGMOD 2008»
15 years 9 months ago
Toward best-effort information extraction
Current approaches to develop information extraction (IE) programs have largely focused on producing precise IE results. As such, they suffer from three major limitations. First, ...
Warren Shen, Pedro DeRose, Robert McCann, AnHai Do...