Sciweavers

169
Voted
CIARP
2009
Springer
15 years 9 months ago
Pigmented Skin Lesions Classification Using Dermatoscopic Images
In this paper we propose a machine learning approach to classify melanocytic lesions in malignant and benign from dermatoscopic images. The image database is composed of 433 benign...
Germán Capdehourat, Andrés Corez, An...
SPAA
2010
ACM
15 years 9 months ago
Deadlock avoidance for streaming computations with filtering
Peng Li, Kunal Agrawal, Jeremy Buhler, Roger D. Ch...
162
Voted
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Indistinguishability Amplification
system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and pro...
Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner
128
Voted
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
138
Voted
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin