Sciweavers

2237 search results - page 14 / 448
» On the Security of Random Sources
Sort
View
ISI
2003
Springer
15 years 2 months ago
Scalable Knowledge Extraction from Legacy Sources with SEEK
Joachim Hammer, William J. O'Brien, Mark S. Schmal...
SODA
2003
ACM
115views Algorithms» more  SODA 2003»
14 years 11 months ago
Random walks on the vertices of transportation polytopes with constant number of sources
We consider the problem of uniformly sampling a vertex of a transportation polytope with m sources and n destinations, where m is a constant. We analyse a natural random walk on t...
Mary Cryan, Martin E. Dyer, Haiko Müller, Lee...
SPEECH
2011
14 years 4 months ago
Combining localization cues and source model constraints for binaural source separation
We describe a system for separating multiple sources from a two-channel recording based on interaural cues and prior knowledge of the statistics of the underlying source signals. ...
Ron J. Weiss, Michael I. Mandel, Daniel P. W. Elli...
CORR
2010
Springer
150views Education» more  CORR 2010»
14 years 6 months ago
On extracting common random bits from correlated sources
Suppose Alice and Bob receive strings of unbiased independent but noisy bits from some random source. They wish to use their respective strings to extract a common sequence of ran...
Andrej Bogdanov, Elchanan Mossel
MMAS
2010
Springer
14 years 4 months ago
Source Localization in Random Acoustic Waveguides
Mode coupling due to scattering by weak random inhomogeneities in waveguides leads to loss of coherence of wave fields at long distances of propagation. This in turn leads to serio...
Liliana Borcea, Leila Issa, Chrysoula Tsogka