Sciweavers

2237 search results - page 100 / 448
» On the Security of Random Sources
Sort
View
131
Voted
IJNSEC
2007
121views more  IJNSEC 2007»
15 years 4 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
DCC
2010
IEEE
15 years 12 months ago
LZ77-Like Compression with Fast Random Access
We introduce an alternative Lempel-Ziv text parsing, LZ-End, that converges to the entropy and in practice gets very close to LZ77. LZ-End forces sources to finish at the end of ...
Sebastian Kreft, Gonzalo Navarro
CSDA
2010
118views more  CSDA 2010»
15 years 5 months ago
Grapham: Graphical models with adaptive random walk Metropolis algorithms
Recently developed adaptive Markov chain Monte Carlo (MCMC) methods have been applied successfully to many problems in Bayesian statistics. Grapham is a new open source implementat...
Matti Vihola
SIGPRO
2002
58views more  SIGPRO 2002»
15 years 4 months ago
A HMM approach to the estimation of random trajectories on manifolds
Dynamic image analysis requires the estimation of time-varying model parameters (e.g., shape coe cients). This can be11 seen as states of a dynamic model which are restricted to a...
Jorge S. Marques, João Miranda Lemos, Arnal...
TIP
2010
137views more  TIP 2010»
14 years 11 months ago
Adaptive Langevin Sampler for Separation of t-Distribution Modelled Astrophysical Maps
We propose to model the image differentials of astrophysical source maps by Student's t-distribution and to use them in the Bayesian source separation method as priors. We int...
Koray Kayabol, Ercan E. Kuruoglu, José Luis...