Sciweavers

15 search results - page 2 / 3
» Threat Analysis of a Practical Voting Scheme with Receipts
Sort
View
ICDAR
2003
IEEE
13 years 10 months ago
A Majority Voting Scheme for Multiresolution Recognition of Handprinted Numerals
This paper proposes a simple voting scheme for off-line recognition of handprinted numerals. One of the main features of the proposed scheme is that this is not script dependent. ...
Ujjwal Bhattacharya, B. B. Chaudhuri
CORR
2000
Springer
96views Education» more  CORR 2000»
13 years 4 months ago
Robustness of Regional Matching Scheme over Global Matching Scheme
Analyzing the effect of concentrated noise on a typical decision-making process of a simplified two-candidate voting model, we have demonstrated that a local approach using a regi...
Liang Chen, Naoyuki Tokuda
IWDW
2005
Springer
13 years 10 months ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 6 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
ALDT
2011
Springer
200views Algorithms» more  ALDT 2011»
12 years 4 months ago
Vote Elicitation with Probabilistic Preference Models: Empirical Estimation and Cost Tradeoffs
A variety of preference aggregation schemes and voting rules have been developed in social choice to support group decision making. However, the requirement that participants provi...
Tyler Lu, Craig Boutilier