Sciweavers

195 search results - page 21 / 39
» Another View of the Gaussian Algorithm
Sort
View
STOC
1996
ACM
118views Algorithms» more  STOC 1996»
15 years 1 months ago
Characterizing Linear Size Circuits in Terms of Privacy
In this paper we prove a perhaps unexpected relationship between the complexity class of the boolean functions that have linear size circuits, and n-party private protocols. Speci...
Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosé...
ICDE
2003
IEEE
120views Database» more  ICDE 2003»
15 years 11 months ago
Broadcasting Dependent Data for Ordered Queries without Replication in a Multi-Channel Mobile Environment
In several mobile applications, the data items broadcast are dependent upon one another. However, most prior studies on broadcasting dependent data mainly consider single broadcas...
Jiun-Long Huang, Ming-Syan Chen, Wen-Chih Peng
ICASSP
2009
IEEE
15 years 4 months ago
Exploiting T-junctions for depth segregation in single images
Occlusion is one of the major consequences of the physical image generation process: it occurs when an opaque object partly obscures the view of another object further away from t...
Mariella Dimiccoli, Philippe Salembier
ECAI
2010
Springer
14 years 10 months ago
Propagation of Opinions in Structural Graphs
Trust and reputation measures are crucial in distributed open systems where agents need to decide whom or what to choose. Existing work has mainly focused on the reputation of sing...
Nardine Osman, Carles Sierra, Jordi Sabater-Mir
86
Voted
MMS
2007
14 years 9 months ago
New approaches to encryption and steganography for digital videos
In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an ex...
Daniel Socek, Hari Kalva, Spyros S. Magliveras, Og...