Sciweavers

6251 search results - page 201 / 1251
» Randomness, Computability, and Density
Sort
View
145
Voted
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
ICPP
2008
IEEE
15 years 10 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
JCST
2008
102views more  JCST 2008»
15 years 4 months ago
Random and Periodic Sleep Schedules for Target Detection in Sensor Networks
Abstract--We study Random and Periodic sleep schedules from the point of view of delay in detecting the target. We consider sleep schedules in which a sensor in `inactive' mod...
Vaishali P. Sadaphal, Bijendra N. Jain
ICPR
2010
IEEE
15 years 9 months ago
On-Line Random Naive Bayes for Tracking
—Randomized learning methods (i.e., Forests or Ferns) have shown excellent capabilities for various computer vision applications. However, it was shown that the tree structure in...
Martin Godec, Christian Leistner, Amir Saffari, Ho...
CVBIA
2005
Springer
15 years 9 months ago
Segmenting Brain Tumors with Conditional Random Fields and Support Vector Machines
Abstract. Markov Random Fields (MRFs) are a popular and wellmotivated model for many medical image processing tasks such as segmentation. Discriminative Random Fields (DRFs), a dis...
Chi-Hoon Lee, Mark Schmidt, Albert Murtha, Aalo Bi...