Sciweavers

128 search results - page 9 / 26
» Weak Verifiable Random Functions
Sort
View
DAC
1999
ACM
15 years 10 months ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...
MCS
2007
Springer
15 years 3 months ago
Cooperative Coevolutionary Ensemble Learning
Abstract. A new optimization technique is proposed for classifiers fusion — Cooperative Coevolutionary Ensemble Learning (CCEL). It is based on a specific multipopulational evo...
Daniel Kanevskiy, Konstantin Vorontsov
FOCS
1999
IEEE
15 years 1 months ago
Near-Optimal Conversion of Hardness into Pseudo-Randomness
Various efforts ([?, ?, ?]) have been made in recent years to derandomize probabilistic algorithms using the complexity theoretic assumption that there exists a problem in E = dti...
Russell Impagliazzo, Ronen Shaltiel, Avi Wigderson
73
Voted
STOC
2003
ACM
154views Algorithms» more  STOC 2003»
15 years 10 months ago
Boosting in the presence of noise
Boosting algorithms are procedures that "boost" low-accuracy weak learning algorithms to achieve arbitrarily high accuracy. Over the past decade boosting has been widely...
Adam Kalai, Rocco A. Servedio
IJNSEC
2008
155views more  IJNSEC 2008»
14 years 9 months ago
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maint...
Mohammed Misbahuddin, C. Shoba Bindu