Sciweavers

1628 search results - page 179 / 326
» Compiler Construction Using Scheme
Sort
View
IACR
2011
94views more  IACR 2011»
14 years 4 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
14 years 20 days ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...
125
Voted
ACSD
2005
IEEE
66views Hardware» more  ACSD 2005»
15 years 10 months ago
Gaining Predictability and Noise Immunity in Global Interconnects
We present a bundled data communication scheme that is robust to crosstalk effects, and to manufacturing and environmental variations. Unlike a data bus, where each receiver alway...
Yinghua Li, Alex Kondratyev, Robert K. Brayton
CEC
2007
IEEE
15 years 11 months ago
An efficient Genetic Algorithm with uniform crossover for the multi-objective Airport Gate Assignment Problem
—Genetic Algorithms (GAs) have a good potential of solving the Gate Assignment Problem (GAP) at airport terminals, and the design of feasible and efficient evolutionary operators...
Xiao-Bing Hu, Ezequiel A. Di Paolo
SIBGRAPI
2006
IEEE
15 years 11 months ago
Adapted Dynamic Meshes for Deformable Surfaces
Deformable objects play an important role in many applications, such as animation and simulation. Effective computation with deformable surfaces can be achieved through the use of...
Fernando de Goes, Felipe P. G. Bergo, Alexandre X....