Sciweavers

263 search results - page 33 / 53
» Extracting Randomness Using Few Independent Sources
Sort
View
ECOOP
2009
Springer
14 years 8 months ago
Stepping Stones over the Refactoring Rubicon
Refactoring tools allow the programmer to pretend they are working with a richer language where the behaviour of a program is automatically preserved during restructuring. In this ...
Mathieu Verbaere, Max Schäfer, Oege de Moor, ...
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 7 months ago
Anonymous Networking amidst Eavesdroppers
—The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of “anonymity” of routes in eave...
Parvathinathan Venkitasubramaniam, Ting He, Lang T...
TCIAIG
2010
13 years 2 months ago
Monte Carlo Tree Search in Hex
Hex, the classic board game invented by Piet Hein in 1942 and independently by John Nash in 1948, has been a domain of artificial intelligence research since Claude Shannon's ...
Broderick Arneson, Ryan B. Hayward, Philip Henders...
IBPRIA
2009
Springer
13 years 11 months ago
Autonomous Configuration of Parameters in Robotic Digital Cameras
In the past few years, the use of digital cameras in robotic applications has been increasing significantly. The main areas of application of these robots are the industry and mili...
António J. R. Neves, Bernardo Cunha, Armand...
TIT
2010
150views Education» more  TIT 2010»
13 years 2 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam