Sciweavers

198 search results - page 17 / 40
» The Multiplicative Quantum Adversary
Sort
View
ALT
2001
Springer
14 years 4 months ago
Real-Valued Multiple-Instance Learning with Queries
While there has been a significant amount of theoretical and empirical research on the multiple-instance learning model, most of this research is for concept learning. However, f...
Daniel R. Dooly, Sally A. Goldman, Stephen Kwek
COLT
2010
Springer
13 years 5 months ago
Robust Selective Sampling from Single and Multiple Teachers
We present a new online learning algorithm in the selective sampling framework, where labels must be actively queried before they are revealed. We prove bounds on the regret of ou...
Ofer Dekel, Claudio Gentile, Karthik Sridharan
EUROCRYPT
2003
Springer
14 years 25 days ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
14 years 25 days ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
ACSAC
2010
IEEE
13 years 5 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang