Sciweavers

625 search results - page 58 / 125
» Generalized Ring Signatures
Sort
View
ALGORITHMICA
2002
121views more  ALGORITHMICA 2002»
13 years 7 months ago
Sharp Quantum versus Classical Query Complexity Separations
We obtain the strongest separation between quantum and classical query complexity known to date--specifically, we define a black-box problem that requires exponentially many querie...
J. Niel de Beaudrap, Richard Cleve, John Watrous
SIAMCO
2000
164views more  SIAMCO 2000»
13 years 7 months ago
(C, A)-Invariance of Modules over Principal Ideal Domains
Abstract. For discrete-time linear systems over a principal ideal domain, three types of (C, A)invariance can be distinguished. Connections between these notions are investigated. ...
Naoharu Ito, Wiland Schmale, Harald K. Wimmer
DCC
2011
IEEE
13 years 2 months ago
On the correlation distribution of Delsarte-Goethals sequences
For odd integer m ≥ 3 and t = 0, 1, . . . , m−1 2 , we define Family V (t) to be a set of size 2m(t+1) containing binary sequences of period 2m+1 − 2. The nontrivial correl...
Kai-Uwe Schmidt
CORR
2011
Springer
154views Education» more  CORR 2011»
12 years 11 months ago
A Fuzzy View on k-Means Based Signal Quantization with Application in Iris Segmentation
— This paper shows that the k-means quantization of a signal can be interpreted both as a crisp indicator function and as a fuzzy membership assignment describing fuzzy clusters ...
Nicolaie Popescu-Bodorin
RAID
2000
Springer
13 years 11 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner