Sciweavers

3116 search results - page 258 / 624
» Recovering
Sort
View
111
Voted
AAECC
2005
Springer
131views Algorithms» more  AAECC 2005»
15 years 22 days ago
Noisy interpolation of sparse polynomials in finite fields
Abstract We consider a polynomial analogue of the hidden number problem introduced by Boneh andVenkatesan, namely the sparse polynomial noisy interpolation problem of recovering an...
Igor Shparlinski, Arne Winterhof
96
Voted
SIGOPS
2008
95views more  SIGOPS 2008»
15 years 22 days ago
Virtual machine time travel using continuous data protection and checkpointing
Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve vi...
Paula Ta-Shma, Guy Laden, Muli Ben-Yehuda, Michael...
95
Voted
SIGPRO
2008
130views more  SIGPRO 2008»
15 years 22 days ago
Cepstrum of bispectrum - A new approach to blind system reconstruction
In this paper, an improved approach to blind deconvolution of LTI systems incorporating phase unwrapping is presented. The method can recover a noise-free estimate of the logarith...
Shahjahan Shahid, Jacqueline Walker
108
Voted
AMC
2005
112views more  AMC 2005»
15 years 22 days ago
Stieltjes moment problem via fractional moments
Stieltjes moment problem is considered to recover a probability density function from the knowledge of its infinite sequence of ordinary moments. The approximate density is obtain...
Pierluigi Novi Inverardi, Alberto Petri, Giorgio P...
IJSN
2007
94views more  IJSN 2007»
15 years 22 days ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen