Sciweavers

7839 search results - page 1260 / 1568
» What's there and what's not
Sort
View
JASIS
2011
110views more  JASIS 2011»
14 years 4 months ago
A material history of bits
In both the popular press and scholarly research, digital information is persistently discussed in terms that imply its immateriality. In this characterization, the digital derive...
Jean-François Blanchette
JOC
2011
104views more  JOC 2011»
14 years 4 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
MSR
2011
ACM
14 years 4 months ago
An empirical analysis of the FixCache algorithm
The FixCache algorithm, introduced in 2007, effectively identifies files or methods which are likely to contain bugs by analyzing source control repository history. However, many ...
Caitlin Sadowski, Chris Lewis 0002, Zhongpeng Lin,...
SIAMFM
2011
75views more  SIAMFM 2011»
14 years 4 months ago
Dynamic Hedging of Portfolio Credit Derivatives
As shown by the recent turmoil in credit markets, much remains to be done for the proper risk management of credit derivatives. In particular, the static copula-based models commo...
Rama Cont, Yu Hang Kan
ICCV
2011
IEEE
14 years 1 months ago
Maximizing All Margins: Pushing Face Recognition with Kernel Plurality
We present two theses in this paper: First, performance of most existing face recognition algorithms improves if instead of the whole image, smaller patches are individually class...
Ritwik Kumar, Arunava Banerjee, CISE, Univ, Baba V...
« Prev « First page 1260 / 1568 Last » Next »