Sciweavers

247 search results - page 17 / 50
» Extracting All the Randomness from a Weakly Random Source
Sort
View
JCNS
2008
55views more  JCNS 2008»
13 years 7 months ago
From stimulus estimation to combination sensitivity: encoding and processing of amplitude and timing information in parallel, co
Information theoretical approaches to sensory processing in electric fish have focused on the encoding of amplitude modulations in a single sensory pathway in the South American gy...
Bruce A. Carlson, Masashi Kawasaki
TSD
2009
Springer
14 years 2 days ago
Combining Text Vector Representations for Information Retrieval
Abstract. This paper suggests a novel representation for documents that is intended to improve precision. This representation is generated by combining two central techniques: Rand...
Maya Carrillo, Chris Eliasmith, Aurelio Lóp...
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
14 years 23 days ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
CIKM
2008
Springer
13 years 9 months ago
Identifying table boundaries in digital documents via sparse line detection
Most prior work on information extraction has focused on extracting information from text in digital documents. However, often, the most important information being reported in an...
Ying Liu, Prasenjit Mitra, C. Lee Giles
CN
2007
122views more  CN 2007»
13 years 7 months ago
Impact of mobility on the performance of relaying in ad hoc networks - Extended version
— We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly diffe...
Ahmad Al Hanbali, Arzad Alam Kherani, Robin Groene...