Sciweavers

3370 search results - page 40 / 674
» Correlation Embedding Analysis
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
ICDM
2007
IEEE
156views Data Mining» more  ICDM 2007»
14 years 25 days ago
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
This paper addresses the task of change analysis of correlated multi-sensor systems. The goal of change analysis is to compute the anomaly score of each sensor when we know that t...
Tsuyoshi Idé, Spiros Papadimitriou, Michail...
ICPR
2010
IEEE
13 years 11 months ago
SemiCCA: Efficient Semi-Supervised Learning of Canonical Correlations
Canonical correlation analysis (CCA) is a powerful tool for analyzing multi-dimensional paired data. However, CCA tends to perform poorly when the number of paired samples is limit...
Akisato Kimura, Hirokazu Kameoka, Masashi Sugiyama...
BIOSYSTEMS
2008
75views more  BIOSYSTEMS 2008»
13 years 9 months ago
Using matrix of thresholding partial correlation coefficients to infer regulatory network
DNA arrays measure the expression levels for thousands of genes simultaneously under different conditions. These measurements reflect many aspects of the underlying biological pro...
Lide Han, Jun Zhu