Sciweavers

1510 search results - page 190 / 302
» Upper Probabilities and Additivity
Sort
View
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
15 years 10 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart
MDAI
2005
Springer
15 years 10 months ago
Noise-Robust Watermarking for Numerical Datasets
Watermarking has been used on multimedia for a variety of applications, among which intellectual property protection stands out. However, and in spite of a growing need, very few a...
Francesc Sebé, Josep Domingo-Ferrer, Agusti...
INFOCOM
2002
IEEE
15 years 9 months ago
Individual QoS versus Aggregate QoS: A Loss Performance Study
Abstract— This papers explores, primarily by means of analysis, the differences that can exist between individual and aggregate loss guarantees in an environment where guarantees...
Ying Xu, Roch Guérin
ITCC
2000
IEEE
15 years 8 months ago
Projection-Based Multiuser Receiver over Frequency Selective Channels
In multiuser communication, the receiver’s performance is degraded by multiuser interference (MUI) as well as multipath distortions. This paper aims at elimination of these side...
Zhengyuan (Daniel) Xu
FOCS
2004
IEEE
15 years 8 months ago
Extracting Randomness Using Few Independent Sources
In this work we give the first deterministic extractors from a constant number of weak sources whose entropy rate is less than 1/2. Specifically, for every > 0 we give an expl...
Boaz Barak, Russell Impagliazzo, Avi Wigderson