1
Multimedia Technology and Enhanced Learning [E-Book] : 4th EAI International Conference, ICMTEL 2022, Virtual Event, April 15-16, 2022, Proceedings /
Table of Contents: ... Hashing for Image Retrieval -- Covid-19 detection by Wavelet Entropy and Artificial Bee Colony -- Heat-map Algorithm based Multi-robots Path Planning Method -- Workshop of Data Fusion for Positioning and Navigation -- Distributed quaternion Kalman filter...

Full text 
2
Human Centered Computing [E-Book] : 6th International Conference, HCC 2020, Virtual Event, December 14-15, 2020, Revised Selected Papers /
Table of Contents: ... for Video Anomaly Analysis with Weak Label -- A Data Fusion Model based on Multi-source Non-real-time Intelligence -- Ancient Chinese Lexicon Construction Based on Unsupervised Algorithm of Minimum Entropy and CBDB Optimization -- Availability Analysis of GNSS...

Full text 
3
Advances in Cryptology - CRYPTO 2021 [E-Book] : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part IV /
Table of Contents: ... -- Low-Complexity Cryptography -- Low-Complexity Weak Pseudorandom Functions in AC0[MOD2] -- MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications -- No Time to Hash: On Super-Efficient Entropy Accumulation...

Full text 
4
IoT as a Service [E-Book] : 6th EAI International Conference, IoTaaS 2020, Xi'an, China, November 19-20, 2020, Proceedings /
Li, Bo
2021
Table of Contents: ... -- Modulation Pattern Recognition Based on Wavelet Approximate Coefficient Entropy -- A new message passing algorithm based on sphere decoding improvement -- A Novel Codebook Design Scheme for Sparse Code Multiple Access -- Multi-View Polarization HRRP Target...

Full text 
5
Digital-Forensics and Watermarking [E-Book] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers /
Table of Contents: ... and Natural Ones Using Smoothness Property and Local Entropy -- Multiple MP3 Compression Detection based on the Statistical Properties of Scale Factors -- Detection of Double compression for HEVC videos based on the Co-occurrence Matrix of DCT coefficients...

Full text 
6
Information Theoretic Security [E-Book] : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers /
Table of Contents: ...Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy....

Full text 
7
Information Theoretic Security [E-Book] : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings /
Table of Contents: ... -- New Lower Bounds for Privacy in Communication Protocols -- On the Transmit Beamforming for MIMO Wiretap Channels: Large-System Analysis -- Information Theoretic Security for Encryption Based on Conditional Renyi Entropies -- Insider-proof encryption...

Full text 
8
Foundations and Practice of Security [E-Book] : 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers /
Table of Contents: ...On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case -- On the Feasibility of a Censorship Resistant Decentralized Naming System -- A General Framework for Group Authentication and Key Exchange Protocols -- Modelling Simultaneous...

Full text 
9
Theory of Quantum Computation, Communication, and Cryptography [E-Book] : 6th Conference, TQC 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers /
Table of Contents: ...Weak Coin Flipping in a Device-Independent Setting -- Security of Device-Independent Quantum Key Distribution Protocols -- The Locking-Decoding Frontier for Generic Dynamics -- Telescopic Relative Entropy. Approximating the Turaev-Viro Invariant...

Full text 
10
Theory of Quantum Computation, Communication, and Cryptography [E-Book] : 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers /
Table of Contents: ... by Quantum Walks on Two-Dimensional Grid without Amplitude Amplification -- The Effects of Free Will on Randomness Expansion -- Semi-device-independent QKD Based on BB84 and a CHSH-Type Estimation -- On Some Special Cases of the Entropy Photon-Number Inequality...

Full text 
11
Maximum Entropy and Bayesian Methods Garching, Germany 1998 [E-Book] : Proceedings of the 18th International Workshop on Maximum Entropy and Bayesian Methods of Statistical Analysis /
Table of Contents: ...Edwin Thompson Jaynes -- A Tribute to Edwin T. Jaynes -- The Near-Irrelevance of Sampling Frequency Distributions -- Outlier Tolerant Parameter Estimation -- Universality, Prior Information and Maximum Entropy in Foams -- Texture Reconstruction in Noisy...

Full text 
12
Maximum Entropy and Bayesian Methods [E-Book] : Boise, Idaho, USA, 1997 Proceedings of the 17th International Workshop on Maximum Entropy and Bayesian Methods of Statistical Analysis /
Table of Contents: ...Massive Inference and Maximum Entropy -- CV-NP Bayesianism by MCMC -- Which Algorithms are Feasible? A Maxent Approach -- Maximum Entropy, Likelihood and Uncertainty: A Comparison -- Probabilistic Methods for Data Fusion -- Whence the Laws of Probability...

Full text 
13
Pattern Recognition Theory and Applications [E-Book] : Proceedings of the NATO Advanced Study Institute held at St. Anne’s College, Oxford, March 29–April 10, 1981 /
Table of Contents: ... Inequalities -- Pattern Class Representation Related to the Karhunen-Loeve Expansion -- Sample Size Sensitive Entropy -- An Optimal Clustering Method Based on the Rasson’s Criterion and Resulting from a New Approach -- Computational Geometric Problems in Pattern...

Full text