Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
This paper introduces Way Stealing, a simple architectural modification to a cache-based processor to increase data bandwidth to and from application-specific Instruction Set Exte...
Theo Kluter, Philip Brisk, Paolo Ienne, Edoardo Ch...
This paper examines high dimensional regression with noise-contaminated input and output data. Goals of such learning problems include optimal prediction with noiseless query poin...
— Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the ...
Toshihiro Hori, Tomotaka Wada, Yuuki Ota, Norie Uc...
Text frame classification is needed in many applications such as event identification, exact event boundary identification, navigation, video surveillance in multimedia etc. To the...