Sciweavers

596 search results - page 92 / 120
» Learning noise
Sort
View
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
DSP
2008
13 years 9 months ago
Extension of higher-order HMC modeling with application to image segmentation
In this work, we propose to improve the neighboring relationship ability of the Hidden Markov Chain (HMC) model, by extending the memory lengthes of both the Markov chain process ...
Lamia Benyoussef, Cyril Carincotte, Stéphan...
DCC
2008
IEEE
14 years 8 months ago
Semantic security for the McEliece cryptosystem without random oracles
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill M...
ACL
2011
13 years 18 days ago
Automated Whole Sentence Grammar Correction Using a Noisy Channel Model
Automated grammar correction techniques have seen improvement over the years, but there is still much room for increased performance. Current correction techniques mainly focus on...
Y. Albert Park, Roger Levy
SECON
2010
IEEE
13 years 6 months ago
Tones for Real: Managing Multipath in Underwater Acoustic Wakeup
The principles of sensor networks--low-power, wireless, in-situ sensing with many inexpensive sensors--are only recently penetrating into underwater research. Acoustic communicati...
Affan A. Syed, John S. Heidemann, Wei Ye