Sciweavers

4245 search results - page 849 / 849
» Input Modeling
Sort
View
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
11 years 7 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
ASIACRYPT
2003
Springer
13 years 10 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
ICIP
1997
IEEE
14 years 7 months ago
Image Coupling, Restoration and Enhancement via PDE's
We present a new approach based on Partial Differential Equations (PDE) to restore noisy blurred images. After studying the methods to denoise images, staying as close as possible...
Pierre Kornprobst, Rachid Deriche, Gilles Aubert
SIAMCOMP
2002
138views more  SIAMCOMP 2002»
13 years 5 months ago
Phase Change of Limit Laws in the Quicksort Recurrence under Varying Toll Functions
We characterize all limit laws of the quicksort type random variables defined recursively by Xn d = XIn + X n-1-In + Tn when the "toll function" Tn varies and satisfies ...
Hsien-Kuei Hwang, Ralph Neininger
NAR
2011
267views Computer Vision» more  NAR 2011»
12 years 12 months ago
EcoCyc: a comprehensive database of Escherichia coli biology
EcoCyc (http://EcoCyc.org) is a comprehensive model organism database for Escherichia coli K-12 MG1655. From the scientific literature, EcoCyc captures the functions of individual...
Ingrid M. Keseler, Julio Collado-Vides, Alberto Sa...