Sciweavers

851 search results - page 112 / 171
» Random constructions and density results
Sort
View
ICRA
2007
IEEE
136views Robotics» more  ICRA 2007»
15 years 4 months ago
Automated Nanomanipulation with Atomic Force Microscopes
Abstract—Automation has long been recognized as an important goal in AFM (Atomic Force Microscope) nanomanipulation research. For the precise manipulation of small particles with...
Babak Mokaberi, Jaehong Yun, Michael Wang, Aristid...
CRYPTO
1990
Springer
58views Cryptology» more  CRYPTO 1990»
15 years 2 months ago
Structural Properties of One-way Hash Functions
We study the following two kinds of one-way hash functions: universal oneway hash functions (UOHs) and collision intractable hash functions (CIHs). The main property of the former...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
15 years 10 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
ECCC
2006
134views more  ECCC 2006»
14 years 10 months ago
Derandomizing the AW matrix-valued Chernoff bound using pessimistic estimators and applications
Ahlswede and Winter [AW02] introduced a Chernoff bound for matrix-valued random variables, which is a non-trivial generalization of the usual Chernoff bound for real-valued random...
Avi Wigderson, David Xiao
75
Voted
CVPR
2007
IEEE
16 years 2 days ago
Pyramid Match Hashing: Sub-Linear Time Indexing Over Partial Correspondences
Matching local features across images is often useful when comparing or recognizing objects or scenes, and efficient techniques for obtaining image-to-image correspondences have b...
Kristen Grauman, Trevor Darrell