Sciweavers

2237 search results - page 112 / 448
» On the Security of Random Sources
Sort
View
172
Voted
CVPR
2011
IEEE
15 years 15 days ago
Random Field Topic Model for Semantic Region Analysis in Crowded Scenes from Tracklets
In this paper, a Random Field Topic (RFT) model is proposed for semantic region analysis from motions of objects in crowded scenes. Different from existing approaches of learning ...
Bolei Zhou, Xiaogang Wang
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 6 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
PEWASUN
2006
ACM
15 years 11 months ago
Analytical modeling of random waypoint mobility patterns
Mobility, in its various forms, is one of the sources of several technical challenges being addressed in the last years to achieve a more flexible computing and communication inf...
Fábio Delamare, Fernando Luís Dotti,...
AOSD
2007
ACM
15 years 9 months ago
Efficiently mining crosscutting concerns through random walks
Inspired by our past manual aspect mining experiences, this paper describes a random walk model to approximate how crosscutting concerns can be discovered in the absence of domain...
Charles Zhang, Hans-Arno Jacobsen
158
Voted
FPL
2006
Springer
147views Hardware» more  FPL 2006»
15 years 8 months ago
Non-Uniform Random Number Generation Through Piecewise Linear Approximations
This paper presents a hardware architecture for non-uniform random number generation, which allows the generator's distribution to be modified at run-time without reconfigura...
David B. Thomas, Wayne Luk