Sciweavers

247 search results - page 7 / 50
» Extracting All the Randomness from a Weakly Random Source
Sort
View
BMCBI
2007
160views more  BMCBI 2007»
13 years 7 months ago
Identifying protein complexes directly from high-throughput TAP data with Markov random fields
Background: Predicting protein complexes from experimental data remains a challenge due to limited resolution and stochastic errors of high-throughput methods. Current algorithms ...
Wasinee Rungsarityotin, Roland Krause, Arno Sch&ou...
FOCS
2009
IEEE
14 years 2 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
APPROX
2010
Springer
139views Algorithms» more  APPROX 2010»
13 years 9 months ago
Two-Source Extractors Secure against Quantum Adversaries
We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two q...
Roy Kasher, Julia Kempe
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 8 months ago
Extracting Objects from the Web
Extracting and integrating object information from the Web is of great significance for Web data management. The existing Web information extraction techniques cannot provide sati...
Zaiqing Nie, Fei Wu, Ji-Rong Wen, Wei-Ying Ma
IACR
2011
73views more  IACR 2011»
12 years 7 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr