We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,870 results
  1. The Biased Coin Flip Process for Nonparametric Topic Modeling

    The Dirichlet and hierarchical Dirichlet processes are two important techniques for nonparametric Bayesian learning. These learning techniques allow...
    Justin Wood, Wei Wang, Corey Arnold in Document Analysis and Recognition – ICDAR 2021
    Conference paper 2021
  2. Coin-based Secure Computations

    In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flip** coins is...

    Yuichi Komano, Takaaki Mizuki in International Journal of Information Security
    Article Open access 06 April 2022
  3. Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output

    Common randomness is an essential resource in many applications. However, Cleve (STOC 86) rules out the possibility of tossing a fair coin from...
    Damiano Abram, Jack Doerner, ... Varun Narayanan in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  4. Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions

    In p-noisy coin-tossing, Alice and Bob obtain fair coins which are of opposite values with probability p. Its Oblivious-Transfer (OT) complexity...
    Saumya Goyal, Varun Narayanan, Manoj Prabhakaran in Theory of Cryptography
    Conference paper 2022
  5. Secret Key Generation: Single Edge-Triggered Flip-Flop PUF for IoT Environment

    Physical Unclonable Function (PUF) is becoming a possible potential primitive circuit in IoT device security. It is receiving significant attention...
    S. Hemavathy, C. Renju Raju, ... V. S. Kanchana Bhaaskaran in Advances in Electrical and Computer Technologies
    Conference paper 2022
  6. Wright Brothers’ Coin Flip Game

    Programming helps us to understand and explain many complicated problems. You can find an interesting online video, "The coin flip conundrum," which...
    Chapter 2019
  7. Quantum Computing by Practice Python Programming in the Cloud with Qiskit and IBM-Q

    Learn to write algorithms and program in the new field of quantum computing. This second edition is updated to equip you with the latest knowledge...

    Vladimir Silva
    Book 2024
  8. Solving Chainmail Jousting

    We consider the Chainmail Jousting game by Gygax and Perren (1971), a symmetric game of pure skill for two players. Preliminary analysis produces a...
    Daniel R. Collins in Computers and Games
    Conference paper 2023
  9. Synthesizing optimal bias in randomized self-stabilization

    Randomization is a key concept in distributed computing to tackle impossibility results. This also holds for self-stabilization in anonymous networks...

    Matthias Volk, Borzoo Bonakdarpour, ... Saba Aflaki in Distributed Computing
    Article Open access 08 November 2021
  10. A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks

    In unmanned stores, automated checkout is an integral part of the process, and the checkout is usually completed by expensive identification...
    Chi Han Chen, Bo Han Chen, Anthony Y. Chang in Wireless Internet
    Conference paper 2020
  11. Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: A Case Study on Gaussian Sampling

    This paper presents an approach to uncover and analyze power side-channel leakages on a processor cycle level precision. By carefully designing and...
    Nils Wisiol, Patrick Gersch, Jean-Pierre Seifert in Smart Card Research and Advanced Applications
    Conference paper 2023
  12. EVM-Vale: Formal Verification of EVM Bytecode Using Vale

    We evaluate the use of the existing Microsoft Vale framework to guarantee correctness of low level Ethereum Virtual Machine (EVM) bytecode, while...
    Daniel Cumming, Mark Utting, ... Marten Risius in Distributed Ledger Technology
    Conference paper 2024
  13. A Linear Weight Transfer Rule for Local Search

    The Divide and Distribute Fixed Weights algorithm (ddfw) is a dynamic local search SAT-solving algorithm that transfers weight from satisfied to...
    Md Solimul Chowdhury, Cayden R. Codel, Marijn J. H. Heule in NASA Formal Methods
    Conference paper 2023
  14. Multiplexing: A

    This chapter explores the fluctuations of random variables away from their mean value. You flip a fair coin 100 times. How likely is it that you get...
    Chapter Open access 2021
  15. An image reranking algorithm based on discrete-time quantum walk

    In order to further improve the performance of image retrieval, a novel image reranking algorithm based on discrete-time quantum walk is proposed. In...

    Wei-Min Shi, Qing-Tian Zhuang, ... Yu-Guang Yang in Multimedia Tools and Applications
    Article 28 September 2023
  16. Compressed Vision for Efficient Video Understanding

    Experience and reasoning occur across multiple temporal scales: milliseconds, seconds, hours or days. The vast majority of computer vision research,...
    Olivia Wiles, João Carreira, ... Mateusz Malinowski in Computer Vision – ACCV 2022
    Conference paper 2023
  17. Generative Datalog and Answer Set Programming – Extended Abstract

    Generative Datalog is an extension of Datalog that incorporates constructs for referencing parameterized probability distributions. This augmentation...
    Conference paper 2023
  18. Information Theory

    The aim of this chapter is to equip the reader with the mathematical instruments necessary for examining the information flow within the scientific...
    Chapter 2024
  19. Randomness in Games

    Randomness adds uncertainty in games. Some games have no randomness whatsoever such as pure skill games like chess or Go. Other games are completely...
    Chapter 2023
  20. Machines Learn Better with Better Data Ontology: Lessons from Philosophy of Induction and Machine Learning Practice

    As scientists start to adopt machine learning (ML) as one research tool, the security of ML and the knowledge generated become a concern. In this...

    Dan Li in Minds and Machines
    Article 20 June 2023
Did you find what you were looking for? Share feedback.