Sciweavers

58 search results - page 7 / 12
» How Leaky Is an Extractor
Sort
View
PE
2002
Springer
118views Optimization» more  PE 2002»
13 years 9 months ago
Procedures and tools for analysis of network traffic measurements
We present procedures and tools for the analysis of network traffic measurements. The tools consist of stand-alone 1 modules that implement advanced statistical analysis procedure...
Costas Courcoubetis, Vasilios A. Siris
FOCS
2000
IEEE
14 years 2 months ago
Extracting Randomness from Samplable Distributions
Randomness extractors convert weak sources of randomness into an almost uniform distribution; the conversion uses a small amount of pure randomness. In algorithmic applications, t...
Luca Trevisan, Salil P. Vadhan
SPIN
2000
Springer
14 years 1 months ago
Logic Verification of ANSI-C Code with SPIN
We describe a tool, called AX, that can be used in combination with the model checker SPIN to efficiently verify logical properties of distributed software systems implemented in A...
Gerard J. Holzmann
ICML
2008
IEEE
14 years 10 months ago
Classification using discriminative restricted Boltzmann machines
Recently, many applications for Restricted Boltzmann Machines (RBMs) have been developed for a large variety of learning problems. However, RBMs are usually used as feature extrac...
Hugo Larochelle, Yoshua Bengio
ICICS
2009
Springer
14 years 4 months ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson