Sciweavers

1628 search results - page 97 / 326
» Compiler Construction Using Scheme
Sort
View
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan
141
Voted
DCC
2007
IEEE
15 years 2 months ago
Sequential and dynamic frameproof codes
There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes and traitor-tracing schemes. The c...
Maura B. Paterson
136
Voted
ICICS
2007
Springer
15 years 8 months ago
(Convertible) Undeniable Signatures Without Random Oracles
We propose a convertible undeniable signature scheme without random oracles. Our construction is based on the Waters signatures proposed in Eurocrypt 2005. The security of our sche...
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susi...
CSC
2006
15 years 3 months ago
Computing the Drift of Mutant Genes
- We develop a numerical scheme for computing the solution of a generalized version of Fisher's equation. The main idea is to use a modi ed Crank-Nicolson method in order to c...
Miguel Olmos-Gomez, Merced Arriaga-Gutierrez, Vali...
JAIR
2010
130views more  JAIR 2010»
14 years 9 months ago
Interactive Cost Configuration Over Decision Diagrams
In many AI domains such as product configuration, a user should interactively specify a solution that must satisfy a set of constraints. In such scenarios, offline compilation of ...
Henrik Reif Andersen, Tarik Hadzic, David Pisinger