Sciweavers

1547 search results - page 45 / 310
» Randomized Variable Elimination
Sort
View
141
Voted
PAMI
2007
97views more  PAMI 2007»
15 years 2 months ago
Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models
As biometric authentication systems become more prevalent, it is becoming increasingly important to evaluate their performance. The current paper introduces a novel statistical me...
Sinjini Mitra, Marios Savvides, Anthony Brockwell
CC
2010
Springer
282views System Software» more  CC 2010»
15 years 26 days ago
Lower Bounds on the Randomized Communication Complexity of Read-Once Functions
Abstract. We prove lower bounds on the randomized two-party communication complexity of functions that arise from read-once boolean formulae. A read-once boolean formula is a formu...
Nikos Leonardos, Michael Saks
CPC
2007
101views more  CPC 2007»
15 years 2 months ago
Colouring Random 4-Regular Graphs
We show that a random 4-regular graph asymptotically almost surely (a.a.s.) has chromatic number 3. The proof uses an efficient algorithm which a.a.s. 3colours a random 4-regular ...
Lingsheng Shi, Nicholas C. Wormald
SIAMCOMP
2002
139views more  SIAMCOMP 2002»
15 years 2 months ago
Limit Laws for Sums of Functions of Subtrees of Random Binary Search Trees
We consider sums of functions of subtrees of a random binary search tree, and obtain general laws of large numbers and central limit theorems. These sums correspond to random recur...
Luc Devroye
140
Voted
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
16 years 3 months ago
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators
We have devised a frequency injection attack which is able to destroy the source of entropy in ring-oscillator-based true random number generators (TRNGs). A TRNG will lock to freq...
A. Theodore Markettos, Simon W. Moore