Sciweavers

3257 search results - page 263 / 652
» Some Results on Effective Randomness
Sort
View
IACR
2011
106views more  IACR 2011»
13 years 10 months ago
Hash Functions Based on Three Permutations: A Generic Security Analysis
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three permutation executions and on XOR-operators, and analyze its collision and preima...
Bart Mennink, Bart Preneel
BMCBI
2006
85views more  BMCBI 2006»
14 years 11 months ago
Searching for interpretable rules for disease mutations: a simulated annealing bump hunting strategy
Background: Understanding how amino acid substitutions affect protein functions is critical for the study of proteins and their implications in diseases. Although methods have bee...
Rui Jiang, Hua Yang, Fengzhu Sun, Ting Chen
ICCV
2007
IEEE
16 years 1 months ago
A 3D Teacher for Car Detection in Aerial Images
This paper demonstrates how to reduce the hand labeling effort considerably by 3D information in an object detection task. In particular, we demonstrate how an efficient car detec...
Stefan Kluckner, Georg Pacher, Helmut Grabner, Hor...
82
Voted
ICML
2008
IEEE
15 years 12 months ago
Efficiently solving convex relaxations for MAP estimation
The problem of obtaining the maximum a posteriori (map) estimate of a discrete random field is of fundamental importance in many areas of Computer Science. In this work, we build ...
M. Pawan Kumar, Philip H. S. Torr
STOC
2007
ACM
84views Algorithms» more  STOC 2007»
15 years 11 months ago
Lower bounds in communication complexity based on factorization norms
We introduce a new method to derive lower bounds on randomized and quantum communication complexity. Our method is based on factorization norms, a notion from Banach Space theory....
Nati Linial, Adi Shraibman