Sciweavers

71 search results - page 14 / 15
» On Tamper-Resistance from a Theoretical Viewpoint
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 3 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
BMCBI
2011
13 years 1 months ago
Estimating developmental states of tumors and normal tissues using a linear time-ordered model
Background: Tumor cells are considered to have an aberrant cell state, and some evidence indicates different development states appearing in the tumorigenesis. Embryonic developme...
Bo Zhang, Beibei Chen, Tao Wu, Zhenyu Xuan, Xiaope...
ICASSP
2011
IEEE
12 years 9 months ago
On single-channel noise reduction in the time domain
In this paper, we revisit the noise-reduction problem in the time domain and present a way to decompose the ltered speech into two uncorrelated (orthogonal) components: the desire...
Jingdong Chen, Jacob Benesty, Yiteng Huang, Tomas ...
IEICET
2006
108views more  IEICET 2006»
13 years 6 months ago
Plaintext Simulatability
We propose a new security class, called plaintext-simulatability, defined over the public-key encryption schemes. The notion of plaintext simulatability (denoted PS) is similar to ...
Eiichiro Fujisaki
TNN
2010
148views Management» more  TNN 2010»
13 years 22 days ago
Generalized low-rank approximations of matrices revisited
Compared to Singular Value Decomposition (SVD), Generalized Low Rank Approximations of Matrices (GLRAM) can consume less computation time, obtain higher compression ratio, and yiel...
Jun Liu, Songcan Chen, Zhi-Hua Zhou, Xiaoyang Tan