Search
Search Results
-
The Biased Coin Flip Process for Nonparametric Topic Modeling
The Dirichlet and hierarchical Dirichlet processes are two important techniques for nonparametric Bayesian learning. These learning techniques allow... -
Coin-based Secure Computations
In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flip** coins is...
-
Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output
Common randomness is an essential resource in many applications. However, Cleve (STOC 86) rules out the possibility of tossing a fair coin from... -
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions
In p-noisy coin-tossing, Alice and Bob obtain fair coins which are of opposite values with probability p. Its Oblivious-Transfer (OT) complexity... -
Secret Key Generation: Single Edge-Triggered Flip-Flop PUF for IoT Environment
Physical Unclonable Function (PUF) is becoming a possible potential primitive circuit in IoT device security. It is receiving significant attention... -
Wright Brothers’ Coin Flip Game
Programming helps us to understand and explain many complicated problems. You can find an interesting online video, "The coin flip conundrum," which... -
Quantum Computing by Practice Python Programming in the Cloud with Qiskit and IBM-Q
Learn to write algorithms and program in the new field of quantum computing. This second edition is updated to equip you with the latest knowledge...
-
Solving Chainmail Jousting
We consider the Chainmail Jousting game by Gygax and Perren (1971), a symmetric game of pure skill for two players. Preliminary analysis produces a... -
Synthesizing optimal bias in randomized self-stabilization
Randomization is a key concept in distributed computing to tackle impossibility results. This also holds for self-stabilization in anonymous networks...
-
A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks
In unmanned stores, automated checkout is an integral part of the process, and the checkout is usually completed by expensive identification... -
Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: A Case Study on Gaussian Sampling
This paper presents an approach to uncover and analyze power side-channel leakages on a processor cycle level precision. By carefully designing and... -
EVM-Vale: Formal Verification of EVM Bytecode Using Vale
We evaluate the use of the existing Microsoft Vale framework to guarantee correctness of low level Ethereum Virtual Machine (EVM) bytecode, while... -
A Linear Weight Transfer Rule for Local Search
The Divide and Distribute Fixed Weights algorithm (ddfw) is a dynamic local search SAT-solving algorithm that transfers weight from satisfied to... -
Multiplexing: A
This chapter explores the fluctuations of random variables away from their mean value. You flip a fair coin 100 times. How likely is it that you get... -
An image reranking algorithm based on discrete-time quantum walk
In order to further improve the performance of image retrieval, a novel image reranking algorithm based on discrete-time quantum walk is proposed. In...
-
Compressed Vision for Efficient Video Understanding
Experience and reasoning occur across multiple temporal scales: milliseconds, seconds, hours or days. The vast majority of computer vision research,... -
Generative Datalog and Answer Set Programming – Extended Abstract
Generative Datalog is an extension of Datalog that incorporates constructs for referencing parameterized probability distributions. This augmentation... -
Information Theory
The aim of this chapter is to equip the reader with the mathematical instruments necessary for examining the information flow within the scientific... -
Randomness in Games
Randomness adds uncertainty in games. Some games have no randomness whatsoever such as pure skill games like chess or Go. Other games are completely... -
Machines Learn Better with Better Data Ontology: Lessons from Philosophy of Induction and Machine Learning Practice
As scientists start to adopt machine learning (ML) as one research tool, the security of ML and the knowledge generated become a concern. In this...