Sciweavers

406 search results - page 17 / 82
» Pseudorandomness and Combinatorial Constructions
Sort
View
APPROX
2009
Springer
85views Algorithms» more  APPROX 2009»
15 years 5 months ago
Pseudorandom Generators and Typically-Correct Derandomization
The area of derandomization attempts to provide efficient deterministic simulations of randomized algorithms in various algorithmic settings. Goldreich and Wigderson introduced a n...
Jeff Kinne, Dieter van Melkebeek, Ronen Shaltiel
EJC
2008
14 years 11 months ago
Tabloids and weighted sums of characters of certain modules of the symmetric groups
We consider certain modules of the symmetric groups whose basis elements are called tabloids. As modules of the symmetric groups, some of these are isomorphic to Springer modules. ...
Yasuhide Numata
PAMI
1998
127views more  PAMI 1998»
14 years 10 months ago
The Random Subspace Method for Constructing Decision Forests
—Much of previous attention on decision trees focuses on the splitting criteria and optimization of tree sizes. The dilemma between overfitting and achieving maximum accuracy is ...
Tin Kam Ho
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 3 months ago
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack
Abstract. The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack (CCA) try to make it infeasible for an attacker to f...
Anand Desai
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 5 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...