Sciweavers

309 search results - page 48 / 62
» A New Synthesis of Symmetric Functions
Sort
View
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
15 years 1 months ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
DBSEC
2007
116views Database» more  DBSEC 2007»
14 years 11 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
TWC
2008
125views more  TWC 2008»
14 years 9 months ago
Cooperative communications with relay-selection: when to cooperate and whom to cooperate with?
Abstract--In this paper, we propose a new cooperative communication protocol, which achieves higher bandwidth efficiency while guaranteeing the same diversity order as that of the ...
Ahmed S. Ibrahim, Ahmed K. Sadek, Weifeng Su, K. J...
TIP
2010
166views more  TIP 2010»
14 years 8 months ago
Blurred Image Recognition by Legendre Moment Invariants
—Processing blurred images is a key problem in many image applications. Existing methods to obtain blur invariants which are invariant with respect to centrally symmetric blur ar...
Hui Zhang, Huazhong Shu, Guo-Niu Han, Gouenou Coat...
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
14 years 7 months ago
Location and Scatter Matching for Dataset Shift in Text Mining
Dataset shift from the training data in a source domain to the data in a target domain poses a great challenge for many statistical learning methods. Most algorithms can be viewed ...
Bo Chen, Wai Lam, Ivor W. Tsang, Tak-Lam Wong