Sciweavers

3638 search results - page 21 / 728
» Distribution chain security
Sort
View
NIPS
2003
13 years 9 months ago
Wormholes Improve Contrastive Divergence
In models that define probabilities via energies, maximum likelihood learning typically involves using Markov Chain Monte Carlo to sample from the model’s distribution. If the ...
Geoffrey E. Hinton, Max Welling, Andriy Mnih
DATE
2006
IEEE
109views Hardware» more  DATE 2006»
14 years 1 months ago
A secure scan design methodology
It has been proven that scan path is a potent hazard for secure chips. Scan based attacks have been recently demonstrated against DES or AES and several solutions have been presen...
David Hély, Frédéric Bancel, ...
WPES
2006
ACM
14 years 1 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
ICPP
2007
IEEE
14 years 2 months ago
Parallel Algorithms for Bayesian Indoor Positioning Systems
We present two parallel algorithms and their Unified Parallel C implementations for Bayesian indoor positioning systems. Our approaches are founded on Markov Chain Monte Carlo si...
Konstantinos Kleisouris, Richard P. Martin
NIPS
2007
13 years 9 months ago
Markov Chain Monte Carlo with People
Many formal models of cognition implicitly use subjective probability distributions to capture the assumptions of human learners. Most applications of these models determine these...
Adam Sanborn, Thomas L. Griffiths