Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,501,812 papers from all fields of science
Search
Sign In
Create Free Account
Noisy-storage model
The noisy-storage model refers to a cryptographic model employed in quantum cryptography. It assumes that the quantum memory device of an attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Adversary (cryptography)
BB84
Classical capacity
Computational hardness assumption
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Detecting and Estimating Multivariate Self-Similar Sources in High-Dimensional Noisy Mixtures
P. Abry
,
H. Wendt
,
G. Didier
Symposium on Software Performance
2018
Corpus ID: 52147302
Nowadays, because of the massive and systematic deployment of sensors, systems are routinely monitored via a large collection of…
Expand
2018
2018
Increasing retrieval efficiency In noisy corpora
Riya Roy
2018
Corpus ID: 88472616
In this thesis we tried to catch the word variations in the noisy corpus. Initially we tried to solve the problem using string…
Expand
2013
2013
Minimal Shrinkage for Noisy Data Recovery Using Schatten-p Norm Objective
Deguang Kong
,
Miao Zhang
,
C. Ding
ECML/PKDD
2013
Corpus ID: 9094308
Noisy data recovery is an important problem in machine learning field, which has widely applications for collaborative prediction…
Expand
Review
2013
Review
2013
Classification of Lattice-based Fully Homomorphic Encryption from Noisy Polly Cracker
Rakyong Choi
,
Kwangjo Kim
2013
Corpus ID: 45384288
Lattices have been used to construct many cryptographic primitives after Ajtai’s seminal paper in 1996. The goal of this paper is…
Expand
2012
2012
Solving Very Large Optimization Problems (Up to One Billion Variables) with a Parallel Evolutionary Algorithm in CPU and GPU
S. Iturriaga
,
Sergio Nesmachnow
Seventh International Conference on P2P, Parallel…
2012
Corpus ID: 16067650
This article presents the application of a parallel evolutionary algorithm implemented in both CPU and Graphic Processing Units…
Expand
Highly Cited
2010
Highly Cited
2010
Co-training with relevant random subspaces
Y. Yaslan
,
Z. Cataltepe
Neurocomputing
2010
Corpus ID: 35896116
2010
2010
Improving accuracy of identifying clinical concepts in noisy unstructured clinical notes using existing internal redundancy
J. Patrick
,
Pooyan Asgari
,
Negin Motamedi
Workshop on Analytics for Noisy Unstructured Text…
2010
Corpus ID: 18709862
This paper, reports on the results of research which is based originally on the 2009 criteria and corpus of "The Obesity…
Expand
2006
2006
Is it Accidental or Intentional? A Symbolic Approach to the Noisy Iterated Prisoner's Dilemma
T. Au
,
Dana S. Nau
2006
Corpus ID: 9412955
AbstractThe following sections are included:IntroductionMotivation and ApproachIterated Prisoner's Dilemma with NoiseStrategies…
Expand
2006
2006
Filtering or adapting: two strategies to exploit noisy parallel corpora for cross-language information retrieval
Lixin Shi
,
Jian-Yun Nie
International Conference on Information and…
2006
Corpus ID: 6567395
Noisy parallel corpora have been widely used for Cross-language information retrieval (CLIR). However, the previous studies only…
Expand
2003
2003
Inside Trading in Kyle-Models
2003
Corpus ID: 17298733
Abstract In his seminal paper, [3], Kyle studies a rational equilibrium setup with 3 types of players: a ’large’ insider, market…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE