Sciweavers

116 search results - page 16 / 24
» Min-Wise Independent Permutations
Sort
View
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 6 months ago
Almost Optimal Bounds for Direct Product Threshold Theorem
Abstract. We consider weakly-verifiable puzzles which are challengeresponse puzzles such that the responder may not be able to verify for itself whether it answered the challenge ...
Charanjit S. Jutla
FOCS
2008
IEEE
14 years 4 months ago
Network Extractor Protocols
We design efficient protocols for processors to extract private randomness over a network with Byzantine faults, when each processor has access to an independent weakly-random n-...
Yael Tauman Kalai, Xin Li, Anup Rao, David Zuckerm...
ICMLA
2008
13 years 11 months ago
Semi-supervised IFA with Prior Knowledge on the Mixing Process: An Application to a Railway Device Diagnosis
Independent Factor Analysis (IFA) is a well known method used to recover independent components from their linear observed mixtures without any knowledge on the mixing process. Su...
Etienne Côme, Zohra Leila Cherfi, Latifa Ouk...
ICASSP
2010
IEEE
13 years 10 months ago
Reverberated speech signal separation based on regularized subband feedforward ICA and instantaneous direction of arrival
In this paper, independent component analysis (ICA) in a subband domain has been extended into a feed-forward network. The feed-forward network maximizes mutual independence of se...
Lae-Hoon Kim, Ivan Tashev, Alex Acero
MICCAI
2003
Springer
14 years 10 months ago
Caudate Shape Discrimination in Schizophrenia Using Template-Free Non-parametric Tests
This paper describes shape analysis of the caudate nucleus structure in a large schizophrenia study (30 controls, 60 schizophrenics). Although analysis of the caudate has not drawn...
Y. Sampath K. Vetsa, Martin Styner, Stephen M. Piz...