Sciweavers

JMLR
2010
104views more  JMLR 2010»
13 years 7 months ago
How to Explain Individual Classification Decisions
After building a classifier with modern tools of machine learning we typically have a black box at hand that is able to predict well for unseen data. Thus, we get an answer to the...
David Baehrens, Timon Schroeter, Stefan Harmeling,...
CAP
2010
13 years 7 months ago
Parallel sparse polynomial interpolation over finite fields
We present a probabilistic algorithm to interpolate a sparse multivariate polynomial over a finite field, represented with a black box. Our algorithm modifies the algorithm of Ben...
Seyed Mohammad Mahdi Javadi, Michael B. Monagan
IGPL
2006
110views more  IGPL 2006»
14 years 17 days ago
Adaptive Model Checking
Abstract. We consider the case where inconsistencies are present between a system and its corresponding model, used for automatic verification. Such inconsistencies can be the resu...
Alex Groce, Doron Peled, Mihalis Yannakakis
DAGSTUHL
2006
14 years 2 months ago
Semidefinite programming characterization and spectral adversary method for quantum complexity with noncommuting unitary queries
Generalizing earlier work characterizing the quantum query complexity of computing a function of an unknown classical "black box" function drawn from some set of such bl...
Howard Barnum
CCS
2008
ACM
14 years 2 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
FOCS
1992
IEEE
14 years 4 months ago
Reconstructing Algebraic Functions from Mixed Data
We consider a variant of the traditional task of explicitly reconstructing algebraic functions from black box representations. In the traditional setting for such problems, one is ...
Sigal Ar, Richard J. Lipton, Ronitt Rubinfeld, Mad...
UMC
2000
14 years 4 months ago
Quantum Information: The New Frontier
Quantum information and computation is the new hype in physics. It is promising, mindboggling and even already applicable in cryptography, with good prospects ahead. A brief, rathe...
Karl Svozil
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
14 years 4 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
DATE
2010
IEEE
141views Hardware» more  DATE 2010»
14 years 5 months ago
An embedded platform for privacy-friendly road charging applications
—Systems based on satellite localization are enabling new scenarios for road charging schemes by offering the possibility to charge drivers as a function of their road usage. An ...
Josep Balasch, Ingrid Verbauwhede, Bart Preneel
ICDCSW
2003
IEEE
14 years 5 months ago
Revealing the Retail Black Box by Interaction Sensing
Today a huge variety of methods to track and analyze the customers’ behavior in e-commerce systems is available. However, in traditional retail stores such systems are not widel...
Christian Decker, Uwe Kubach, Michael Beigl