-
1
-
-
0011690664
-
Randomized algorithms
-
R. Motwani and P. Raghavan, "Randomized algorithms," ACM Computing Surveys (CSUR), vol. 28, no. 1, pp. 33-37, 1996.
-
(1996)
ACM Computing Surveys (CSUR)
, vol.28
, Issue.1
, pp. 33-37
-
-
Motwani, R.1
Raghavan, P.2
-
5
-
-
11944269419
-
Monte carlo simulations: Hidden errors from "good" random number generators
-
Dec
-
A. Ferrenberg, D. Landau, and Y. Wong, "Monte carlo simulations: Hidden errors from "good" random number generators," Phys. Rev. Lett., vol. 69, pp. 3382-3384, Dec 1992.
-
(1992)
Phys. Rev. Lett
, vol.69
, pp. 3382-3384
-
-
Ferrenberg, A.1
Landau, D.2
Wong, Y.3
-
6
-
-
2442604821
-
Randomness and the netscape browser
-
January
-
I. Goldberg and D. Wagner, "Randomness and the netscape browser," Dr. Dobb's, pp. 66-70, January 1996.
-
(1996)
Dr. Dobb's
, pp. 66-70
-
-
Goldberg, I.1
Wagner, D.2
-
7
-
-
33751027155
-
Analysis of the linux random number generator
-
IEEE Computer Society
-
Z. Gutterman, B. Pinkas, and T. Reinman, "Analysis of the linux random number generator," in IEEE Symposium on Security and Privacy, pp. 371-385, IEEE Computer Society, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 371-385
-
-
Gutterman, Z.1
Pinkas, B.2
Reinman, T.3
-
11
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
Berkeley, CA, USA, pp, USENIX Association
-
D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on ssh," in SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium, (Berkeley, CA, USA), pp. 25-25, USENIX Association, 2001.
-
(2001)
SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium
, pp. 25-25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
12
-
-
0005044317
-
Cryptography in OpenBSD: An Overview
-
T. de Raadt, N. Hallqvist, A. Grabowski, A. Keromytis, and N. Provos, "Cryptography in OpenBSD: An Overview," Proc. of the 1999 USENIX Annual Technical Conference, Freenix Track, pp. 93-101, 1999.
-
(1999)
Proc. of the 1999 USENIX Annual Technical Conference, Freenix Track
, pp. 93-101
-
-
de Raadt, T.1
Hallqvist, N.2
Grabowski, A.3
Keromytis, A.4
Provos, N.5
-
13
-
-
70350303568
-
Cryptanalysis of the windows random number generator
-
P. Ning, S. D. C. di Vimercati, and P. F. Syverson, eds, pp, ACM
-
L. Dorrendorf, Z. Gutterman, and B. Pinkas, "Cryptanalysis of the windows random number generator," in ACM Conference on Computer and Communications Security (P. Ning, S. D. C. di Vimercati, and P. F. Syverson, eds.), pp. 476-485, ACM, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 476-485
-
-
Dorrendorf, L.1
Gutterman, Z.2
Pinkas, B.3
-
15
-
-
0025483864
-
Secure random number generation using chaotic circuits
-
G. Bernstein and M. Lieberman, "Secure random number generation using chaotic circuits," Circuits and Systems, IEEE Transactions on, vol. 37, no. 9, pp. 1157-1164, 1990.
-
(1990)
Circuits and Systems, IEEE Transactions on
, vol.37
, Issue.9
, pp. 1157-1164
-
-
Bernstein, G.1
Lieberman, M.2
-
16
-
-
62749142438
-
Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system
-
US Patent 5,732,138
-
L. Noll, R. Mende, S. Sisodiya, et al., "Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system." US Patent 5,732,138, 1998.
-
(1998)
-
-
Noll, L.1
Mende, R.2
Sisodiya, S.3
-
17
-
-
0001949035
-
Generation of random sequences by human subjects: A critical survey of literature
-
W. Wagenaar, "Generation of random sequences by human subjects: A critical survey of literature," Psychological Bulletin, vol. 77, pp. 65-72, 1972.
-
(1972)
Psychological Bulletin
, vol.77
, pp. 65-72
-
-
Wagenaar, W.1
-
18
-
-
70350722053
-
-
D. Munger, Is 17 the most random number?. scienceblogs.com, specifically http://scienceblogs.com/cognitivedaily/2007/02/ index.php?page=3, Feburary 2007.
-
D. Munger, "Is 17 the "most random" number?." scienceblogs.com, specifically http://scienceblogs.com/cognitivedaily/2007/02/ index.php?page=3, Feburary 2007.
-
-
-
-
19
-
-
0347877168
-
Making sense of randomness: Implicit encoding as a basis for judgment
-
April
-
R. Falk and C. Konold, "Making sense of randomness: Implicit encoding as a basis for judgment," Psychological Review, vol. 104, pp. 301-318, April 1997.
-
(1997)
Psychological Review
, vol.104
, pp. 301-318
-
-
Falk, R.1
Konold, C.2
-
20
-
-
2442531807
-
Randomness and induction from streaks: "gambler's fallacy" versus "hot hand
-
B. Burns and B. Corpus, "Randomness and induction from streaks: "gambler's fallacy" versus "hot hand"," Psychonomic Bulletin and Review, vol. 11, pp. 179-184, 2004.
-
(2004)
Psychonomic Bulletin and Review
, vol.11
, pp. 179-184
-
-
Burns, B.1
Corpus, B.2
-
22
-
-
21744450698
-
Randomization in individual choice behavior
-
A. Rapoport and D. Budescu, "Randomization in individual choice behavior," Psychological Review, vol. 104, no. 1, pp. 603-617, 1997.
-
(1997)
Psychological Review
, vol.104
, Issue.1
, pp. 603-617
-
-
Rapoport, A.1
Budescu, D.2
-
23
-
-
36349037056
-
Humans cannot consciously generate random numbers sequences: Polemic study
-
M. Figurska, M. Stańczyk, and K. Kulesza, "Humans cannot consciously generate random numbers sequences: Polemic study," Medical Hypotheses, vol. 70, no. 1, pp. 182-185, 2008.
-
(2008)
Medical Hypotheses
, vol.70
, Issue.1
, pp. 182-185
-
-
Figurska, M.1
Stańczyk, M.2
Kulesza, K.3
-
24
-
-
0040065763
-
Testing Randomness
-
D. Green, "Testing Randomness," Teaching Mathematics and its Applications, vol. 1, no. 3, pp. 95-100, 1982.
-
(1982)
Teaching Mathematics and its Applications
, vol.1
, Issue.3
, pp. 95-100
-
-
Green, D.1
-
25
-
-
33748690481
-
Generation of random series in two-person strictl competitive games
-
A. Rapoport and D. Budescu, "Generation of random series in two-person strictl competitive games," Journal of Experimental Psychology: General, vol. 121, no. 3, pp. 352-363, 1992.
-
(1992)
Journal of Experimental Psychology: General
, vol.121
, Issue.3
, pp. 352-363
-
-
Rapoport, A.1
Budescu, D.2
-
27
-
-
34247540250
-
Games with a purpose
-
June
-
L. von Ahn, "Games with a purpose," Computer, vol. 39, pp. 92-94, June 2006.
-
(2006)
Computer
, vol.39
, pp. 92-94
-
-
von Ahn, L.1
-
28
-
-
33745781447
-
-
B. Barak and S. Halevi, A model and architecture for pseudo-random generation and applications to /dev/random, ACM Conf. Computer and Comm. Security, pp. 203-U-212, 2005.
-
B. Barak and S. Halevi, "A model and architecture for pseudo-random generation and applications to /dev/random," ACM Conf. Computer and Comm. Security, pp. 203-U-212, 2005.
-
-
-
-
29
-
-
0003087344
-
Various techniques used in connection with random digits
-
J. von Neumann, "Various techniques used in connection with random digits," Applied Math Series, vol. 12, pp. 36-38, 1951.
-
(1951)
Applied Math Series
, vol.12
, pp. 36-38
-
-
von Neumann, J.1
-
31
-
-
33745861377
-
True random number generators secure in a changing environment
-
Cryptographic Hardware and Embedded Systems, proc. CHES, Springer
-
B. Barak, R. Shaltiel, and E. Tromer, "True random number generators secure in a changing environment." Cryptographic Hardware and Embedded Systems - proc. CHES 2003, LNCS 2779, 166-180, Springer, 2003.
-
(2003)
LNCS
, vol.2779
, pp. 166-180
-
-
Barak, B.1
Shaltiel, R.2
Tromer, E.3
-
33
-
-
34548677930
-
Checkers Is Solved
-
J. Schaeffer, N. Burch, Y. Bjornsson, A. Kishimoto, M. Muller, R. Lake, P. Lu, and S. Sutphen, "Checkers Is Solved," Science, vol. 317, no. 5844, p. 1518, 2007.
-
(2007)
Science
, vol.317
, Issue.5844
, pp. 1518
-
-
Schaeffer, J.1
Burch, N.2
Bjornsson, Y.3
Kishimoto, A.4
Muller, M.5
Lake, R.6
Lu, P.7
Sutphen, S.8
-
35
-
-
0010168536
-
Naive strategies in competitive games
-
Selten, W.Guth et al, editors, pp
-
A. Rubinstein, A. Tversky, and D. Heller, "Naive strategies in competitive games," Understanding Strategic Interaction - Essays in Honor of Reinhard Selten, W.Guth et al. (editors), pp. 394-402, 1996.
-
(1996)
Understanding Strategic Interaction - Essays in Honor of Reinhard
, pp. 394-402
-
-
Rubinstein, A.1
Tversky, A.2
Heller, D.3
-
36
-
-
0013524272
-
I have no words and i must design
-
available at
-
G. Costikyan, "I have no words and i must design." Interactive Fantasy vol. 2 (1994), available at http://www.costik.com/nowords.html.
-
(1994)
Interactive Fantasy
, vol.2
-
-
Costikyan, G.1
-
37
-
-
33846861322
-
Fitts' law 50 years later: Applications and contributions from human-computer interaction
-
Y. Guiard and M. Beaudouin-Lafon, "Fitts' law 50 years later: applications and contributions from human-computer interaction," International Journal of Human-Computer Studies, vol. 61, no. 6, pp. 747-750, 2004.
-
(2004)
International Journal of Human-Computer Studies
, vol.61
, Issue.6
, pp. 747-750
-
-
Guiard, Y.1
Beaudouin-Lafon, M.2
-
38
-
-
70350726632
-
-
R. corp., A million random digits with 100,000 normal deviates. http://www.rand.org/pubs/monograph reports/MR1418/ (Accessed October 2008), 1955.
-
R. corp., "A million random digits with 100,000 normal deviates." http://www.rand.org/pubs/monograph reports/MR1418/ (Accessed October 2008), 1955.
-
-
-
-
39
-
-
70350708047
-
-
G. Marsaglia, DIEHARD: A Battery of Tests of Randomness, See http://statf.su.edu/~geo/diehard.html, 1996.
-
G. Marsaglia, "DIEHARD: A Battery of Tests of Randomness," See http://statf.su.edu/~geo/diehard.html, 1996.
-
-
-
-
40
-
-
4544353199
-
-
L. von Ahn and L. Dabbish, Labeling images with a computer game, in CHI (E. Dykstra-Erickson and M. Tscheligi, eds.), pp. 319-326, ACM, 2004.
-
L. von Ahn and L. Dabbish, "Labeling images with a computer game," in CHI (E. Dykstra-Erickson and M. Tscheligi, eds.), pp. 319-326, ACM, 2004.
-
-
-
-
41
-
-
65349109969
-
The Martini Synch,
-
Technical report MSR-TR-2007-123, Microsoft Research
-
D. Kirovski, M. Sinclair, and D. Wilson, "The Martini Synch," tech. rep., Technical report MSR-TR-2007-123, Microsoft Research, 2007.
-
(2007)
tech. rep
-
-
Kirovski, D.1
Sinclair, M.2
Wilson, D.3
-
42
-
-
65349086799
-
Shake well before use: Intuitive and secure pairing of mobile devices
-
R. Mayrhofer and H. Gellersen, "Shake well before use: Intuitive and secure pairing of mobile devices," IEEE Transactions on Mobile Computing, vol. 8, no. 6, pp. 792-806, 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.6
, pp. 792-806
-
-
Mayrhofer, R.1
Gellersen, H.2
-
43
-
-
10044266569
-
Speed-accuracy tradeoff in fitts' law tasks: On the equivalency of actual and nominal pointing precision
-
S. Zhai, J. Kong, and X. Ren, "Speed-accuracy tradeoff in fitts' law tasks: on the equivalency of actual and nominal pointing precision," Int. J. Hum.-Comput. Stud., vol. 61, no. 6, pp. 823-856, 2004.
-
(2004)
Int. J. Hum.-Comput. Stud
, vol.61
, Issue.6
, pp. 823-856
-
-
Zhai, S.1
Kong, J.2
Ren, X.3
|