Sciweavers

410 search results - page 82 / 82
» Making norms concrete
Sort
View
KCAP
2011
ACM
12 years 8 months ago
Integrating knowledge capture and supervised learning through a human-computer interface
Some supervised-learning algorithms can make effective use of domain knowledge in addition to the input-output pairs commonly used in machine learning. However, formulating this a...
Trevor Walker, Gautam Kunapuli, Noah Larsen, David...
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
IACR
2011
173views more  IACR 2011»
12 years 5 months ago
All-But-Many Lossy Trapdoor Functions
We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many lossy trapdoor functions (ABM-LTFs) are LTFs that are parametrized with tags. Each tag can...
Dennis Hofheinz
IACR
2011
125views more  IACR 2011»
12 years 4 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
HICSS
2012
IEEE
324views Biometrics» more  HICSS 2012»
12 years 29 days ago
Extending BPMN for Business Activity Monitoring
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...