Sciweavers

492 search results - page 26 / 99
» The number of possibilities for random dating
Sort
View
JORS
2010
189views more  JORS 2010»
13 years 3 months ago
Monte Carlo scenario generation for retail loan portfolios
Monte Carlo simulation is a common method for studying the volatility of market traded instruments. It is less employed in retail lending, because of the inherent nonlinearities in...
J. L. Breeden, D. Ingram
TIT
2010
96views Education» more  TIT 2010»
13 years 3 months ago
Beyond Nyquist: efficient sampling of sparse bandlimited signals
Wideband analog signals push contemporary analog-to-digital conversion systems to their performance limits. In many applications, however, sampling at the Nyquist rate is inefficie...
Joel A. Tropp, Jason N. Laska, Marco F. Duarte, Ju...
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
DATE
2009
IEEE
76views Hardware» more  DATE 2009»
14 years 3 months ago
LFSR-based test-data compression with self-stoppable seeds
—The main disadvantage of LFSR-based compression is that it should be usually combined with a constrained ATPG process, and, as a result, it cannot be effectively applied to IP c...
M. Koutsoupia, Emmanouil Kalligeros, Xrysovalantis...
DATE
2009
IEEE
128views Hardware» more  DATE 2009»
14 years 3 months ago
A case study in distributed deployment of embedded software for camera networks
—We present an embedded software application for the real-time estimation of building occupancy using a network of video cameras. We analyze a series of alternative decomposition...
Francesco Leonardi, Alessandro Pinto, Luca P. Carl...