Sciweavers

1084 search results - page 81 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
15 years 8 months ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
IEEEPACT
2009
IEEE
15 years 1 months ago
Algorithmic Skeletons within an Embedded Domain Specific Language for the CELL Processor
Efficiently using the hardware capabilities of the Cell processor, a heterogeneous chip multiprocessor that uses several levels of parallelism to deliver high performance, and bei...
Tarik Saidani, Joel Falcou, Claude Tadonki, Lionel...
VLSID
1993
IEEE
136views VLSI» more  VLSID 1993»
15 years 8 months ago
A Simulation-Based Test Generation Scheme Using Genetic Algorithms
This paper discusses a Genetic Algorithm-based method of generating test vectorsfor detecting faults in combinational circuits. The GA-based approach combines the merits of two te...
M. Srinivas, Lalit M. Patnaik
CVPR
2005
IEEE
16 years 6 months ago
A Bayesian Approach to Unsupervised Feature Selection and Density Estimation Using Expectation Propagation
We propose an approximate Bayesian approach for unsupervised feature selection and density estimation, where the importance of the features for clustering is used as the measure f...
Shaorong Chang, Nilanjan Dasgupta, Lawrence Carin
ICASSP
2011
IEEE
14 years 7 months ago
Structured precision modelling with Cholesky Basis Superposition for speech recognition
Structured precision modelling is an important approach to improve the intra-frame correlation modelling of the standard HMM, where Gaussian mixture model with diagonal covariance...
Lei Jia, Kai Yu, Bo Xu