Abstract. We present an approach for blindly decomposing an observed random vector x into f(As) where f is a diagonal function i.e. f = f1 × . . . × fm with one-dimensional funct...
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open so...
We provide a review of independent component analysis (ICA) for complex-valued improper and noncircular random sources. An improper random signal is correlated with its complex co...
We give near-optimal constructions of extractors secure against quantum bounded-storage adversaries. One instantiation gives the first such extractor to achieve an output length (...
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...