Sciweavers

123 search results - page 24 / 25
» Derandomizing from Random Strings
Sort
View
GW
2005
Springer
113views Biometrics» more  GW 2005»
14 years 24 days ago
Some Experiments in the Gestural Control of Synthesized Sonic Textures
Abstract. In this paper, we introduce some exploratory ideas and applications involving the gestural control of sonic textures. Three examples of how the gestural control of synthe...
Daniel Arfib, Jean-Michel Couturier, Jehan-Julien ...
WWW
2007
ACM
14 years 8 months ago
Extraction and search of chemical formulae in text documents on the web
Often scientists seek to search for articles on the Web related to a particular chemical. When a scientist searches for a chemical formula using a search engine today, she gets ar...
Bingjun Sun, Qingzhao Tan, Prasenjit Mitra, C. Lee...
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
14 years 7 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
CRYPTO
2004
Springer
111views Cryptology» more  CRYPTO 2004»
14 years 22 days ago
Signed Binary Representations Revisited
The most common method for computing exponentiation of random elements in Abelian groups are sliding window schemes, which enhance the efficiency of the binary method at the expens...
Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Sp...
FOCS
1990
IEEE
13 years 11 months ago
Separating Distribution-Free and Mistake-Bound Learning Models over the Boolean Domain
Two of the most commonly used models in computational learning theory are the distribution-free model in which examples are chosen from a fixed but arbitrary distribution, and the ...
Avrim Blum