Sciweavers

2072 search results - page 394 / 415
» Applications of Independent Component Analysis
Sort
View
MOBICOM
2004
ACM
14 years 2 months ago
On k-coverage in a mostly sleeping sensor network
Sensor networks are often desired to last many times longer than the active lifetime of individual sensors. This is usually achieved by putting sensors to sleep for most of their ...
Santosh Kumar, Ten-Hwang Lai, József Balogh
ICA
2004
Springer
14 years 2 months ago
Second-Order Blind Source Separation Based on Multi-dimensional Autocovariances
SOBI is a blind source separation algorithm based on time decorrelation. It uses multiple time autocovariance matrices, and performs joint diagonalization thus being more robust th...
Fabian J. Theis, Anke Meyer-Bäse, Elmar Wolfg...
ASIACRYPT
2003
Springer
14 years 1 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...
PODS
2010
ACM
215views Database» more  PODS 2010»
14 years 1 months ago
An optimal algorithm for the distinct elements problem
We give the first optimal algorithm for estimating the number of distinct elements in a data stream, closing a long line of theoretical research on this problem begun by Flajolet...
Daniel M. Kane, Jelani Nelson, David P. Woodruff
ASIACRYPT
2000
Springer
14 years 29 days ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung