Sciweavers

324 search results - page 12 / 65
» Guessing based on length functions
Sort
View
KDD
2008
ACM
161views Data Mining» more  KDD 2008»
14 years 8 months ago
Locality sensitive hash functions based on concomitant rank order statistics
: Locality Sensitive Hash functions are invaluable tools for approximate near neighbor problems in high dimensional spaces. In this work, we are focused on LSH schemes where the si...
Kave Eshghi, Shyamsundar Rajaram
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
14 years 1 months ago
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data
Decision makers of companies often face the dilemma of whether to release data for knowledge discovery, vis a vis the risk of disclosing proprietary or sensitive information. Whil...
Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Rames...
WSC
2007
13 years 9 months ago
American option pricing under stochastic volatility: a simulation-based approach
We consider the problem of pricing American options when the volatility of the underlying asset price is stochastic. No specific stochastic volatility model is assumed for the st...
Arunachalam Chockalingam, Kumar Muthuraman
FOCS
2010
IEEE
13 years 5 months ago
The Coin Problem and Pseudorandomness for Branching Programs
The Coin Problem is the following problem: a coin is given, which lands on head with probability either 1/2 + or 1/2 - . We are given the outcome of n independent tosses of this co...
Joshua Brody, Elad Verbin
FSE
2000
Springer
128views Cryptology» more  FSE 2000»
13 years 11 months ago
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift ...
Anne Canteaut, Eric Filiol