Sciweavers

8825 search results - page 1353 / 1765
» All for one or one for all
Sort
View
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 3 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
110
Voted
BDA
2006
15 years 3 months ago
Type-Based XML Projection
XML data projection (or pruning) is one of the main optimization techniques recently adopted in the context of main-memory XML query-engines. The underlying idea is quite simple: ...
Véronique Benzaken, Giuseppe Castagna, Dari...
98
Voted
DAGSTUHL
2004
15 years 3 months ago
Optimal Approximation of Elliptic Problems by Linear and Nonlinear Mappings
We study the optimal approximation of the solution of an operator equation A(u) = f by four types of mappings: a) linear mappings of rank n; b) n-term approximation with respect t...
Erich Novak, Stephan Dahlke, Winfried Sickel
DIMVA
2004
15 years 3 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
DAGSTUHL
2006
15 years 3 months ago
The Space of Cognitive Vision
Cognitive vision is an area that is not yet well-defined, in the sense that one can unambiguously state what issues fall under its purview and what considerations do not. Neither i...
David Vernon
« Prev « First page 1353 / 1765 Last » Next »