Detection theory

Results: 1119



#Item
351Search algorithms / Coding theory / Information theory / Mathematics / Information retrieval / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-02-29 16:05:25
352Image processing / Artificial intelligence / Estimation theory / Object recognition / Maximum likelihood / Edge detection / One-shot learning / Scale-invariant feature transform / Computer vision / Vision / Imaging

Spatial Priors for Part-Based Recognition using Statistical Models David Crandall1 Cornell University Pedro Felzenszwalb

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2007-05-22 23:30:59
353Search algorithms / Data mining / Estimation theory / K-nearest neighbor algorithm / Algorithm / Outlier / Nearest neighbor search / Randomized algorithm / Anomaly detection / Statistics / Data analysis / Statistical inference

On the Power of Randomization in Big Data Analytics Phạm Đăng Ninh Theoretical Computer Science Section IT University of Copenhagen, Denmark

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2014-10-16 14:19:55
354Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
355Signal processing / Time series analysis / Econometrics / Autoregressive conditional heteroskedasticity / Likelihood-ratio test / Maximum likelihood / Spectral density / Likelihood function / Statistics / Estimation theory / Statistical theory

Statistical Methods of Spectrum Change Detection 1 Barry G. Quinn Macquarie University Abstract

Add to Reading List

Source URL: stat.mq.edu.au

Language: English - Date: 2009-07-18 23:01:09
356Information theory / Mathematics / Low-density parity-check code / Reed–Solomon error correction / Niederreiter cryptosystem / McEliece cryptosystem / Parity-check matrix / Hamming / Linear code / Coding theory / Cryptography / Error detection and correction

Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 16:50:34
357Public-key cryptography / Error detection and correction / Electronic commerce / RSA / XTR / Bit error rate / Entropy / Key / Cryptography / Finite fields / Information theory

Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors? Noboru Kunihiro1 , Naoyuki Shinohara2 , and Tetsuya Izu3 1 The University of Tokyo, Japan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-13 19:33:04
358Physical Unclonable Function / Coding theory / Data transmission / Computer arithmetic / Hamming / Forward error correction / Bit error rate / Hardware random number generator / VEST / Cryptography / Randomness / Error detection and correction

Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-28 14:37:53
359Statistical inference / Estimation theory / Outlier / Local outlier factor / Normal distribution / Variance / Estimator / RANSAC / Mean / Statistics / Robust statistics / Data analysis

A Near-linear Time Approximation Algorithm for Angle-based Outlier Detection in High-dimensional Data Ninh Pham Rasmus Pagh

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2013-10-15 07:21:23
360Cryptography / Communications protocol / Data transmission / Protocols / Error detection and correction / Telecommunications engineering / Coding theory / Data / Information

Cryptanalysis of Secure Message Transmission Protocols with Feedback (Full version of the ICITS 2009 paper with the same title and authors) Qiushi Yang1,? and Yvo Desmedt1,2,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-21 09:52:54
UPDATE