Sciweavers

24 search results - page 2 / 5
» fc 2008
Sort
View
FC
2008
Springer
105views Cryptology» more  FC 2008»
13 years 6 months ago
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
Abstract. We consider general secure function evaluation (SFE) of private functions (PF-SFE). Recall, privacy of functions is often most efficiently achieved by general SFE [18,19,...
Vladimir Kolesnikov, Thomas Schneider 0003
GECCO
2008
Springer
130views Optimization» more  GECCO 2008»
13 years 5 months ago
Fitnessless coevolution
We introduce fitnessless coevolution (FC), a novel method of comparative one-population coevolution. FC plays games between individuals to settle tournaments in the selection pha...
Wojciech Jaskowski, Krzysztof Krawiec, Bartosz Wie...
FC
2008
Springer
85views Cryptology» more  FC 2008»
13 years 6 months ago
Countermeasures against Government-Scale Monetary Forgery
Abstract. Physical cash is vulnerable to rising threats, such as large-scale, government-mandated forgeries, that digital cash may protect against more effectively. We study mechan...
Alessandro Acquisti, Nicolas Christin, Bryan Parno...
CVPR
2008
IEEE
14 years 6 months ago
FuzzyMatte: A computationally efficient scheme for interactive matting
In this paper, we propose an online interactive matting algorithm, which we call FuzzyMatte. Our framework is based on computing the fuzzy connectedness (FC) [20] from each unknow...
Yuanjie Zheng, Chandra Kambhamettu, Jingyi Yu, Tho...
FC
2008
Springer
102views Cryptology» more  FC 2008»
13 years 6 months ago
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal ...
André N. Klingsheim, Kjell Jørgen Ho...