Sciweavers

188 search results - page 33 / 38
» Differentially Private Approximation Algorithms
Sort
View
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
13 years 9 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
TMM
2008
126views more  TMM 2008»
13 years 7 months ago
Extraction of Audio Features Specific to Speech Production for Multimodal Speaker Detection
A method that exploits an information theoretic framework to extract optimized audio features using video information is presented. A simple measure of mutual information (MI) betw...
Patricia Besson, Vlad Popovici, Jean-Marc Vesin, J...
INFOCOM
2010
IEEE
13 years 6 months ago
Delay Analysis for Cognitive Radio Networks with Random Access: A Fluid Queue View
Abstract—We consider a cognitive radio network where multiple secondary users (SUs) contend for spectrum usage, using random access, over available primary user (PU) channels. Ou...
Shanshan Wang, Junshan Zhang, Lang Tong
ICDM
2010
IEEE
208views Data Mining» more  ICDM 2010»
13 years 5 months ago
Bonsai: Growing Interesting Small Trees
Graphs are increasingly used to model a variety of loosely structured data such as biological or social networks and entityrelationships. Given this profusion of large-scale graph ...
Stephan Seufert, Srikanta J. Bedathur, Juliá...
CVPR
2005
IEEE
14 years 9 months ago
Boosting Saliency in Color Image Features
The aim of salient point detection is to find distinctive events in images. Salient features are generally determined from the local differential structure of images. They focus o...
Joost van de Weijer, Theo Gevers