Sciweavers

2237 search results - page 20 / 448
» On the Security of Random Sources
Sort
View
ICA
2004
Springer
15 years 3 months ago
Postnonlinear Overcomplete Blind Source Separation Using Sparse Sources
Abstract. We present an approach for blindly decomposing an observed random vector x into f(As) where f is a diagonal function i.e. f = f1 × . . . × fm with one-dimensional funct...
Fabian J. Theis, Shun-ichi Amari
ISSA
2008
14 years 11 months ago
Emerging Framework for The Evaluation of Open Source Security Tools
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open so...
Elmarie Biermann, Jan Mentz
ICASSP
2009
IEEE
15 years 4 months ago
On ICA of improper and noncircular sources
We provide a review of independent component analysis (ICA) for complex-valued improper and noncircular random sources. An improper random signal is correlated with its complex co...
Peter J. Schreier, Tülay Adali, Louis L. Scha...
STOC
2010
ACM
189views Algorithms» more  STOC 2010»
15 years 7 months ago
Near-optimal extractors against quantum storage
We give near-optimal constructions of extractors secure against quantum bounded-storage adversaries. One instantiation gives the first such extractor to achieve an output length (...
Anindya De and Thomas Vidick
CCS
2009
ACM
15 years 4 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams