Sciweavers

1066 search results - page 16 / 214
» Computing Private Set Operations with Linear Complexities
Sort
View
COCO
2008
Springer
97views Algorithms» more  COCO 2008»
14 years 11 months ago
Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-prover Interactive Proof Systems
A central question in quantum information theory and computational complexity is how powerful nonlocal strategies are in cooperative games with imperfect information, such as mult...
Tsuyoshi Ito, Hirotada Kobayashi, Daniel Preda, Xi...
VLDB
2005
ACM
114views Database» more  VLDB 2005»
15 years 3 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
SIBGRAPI
2006
IEEE
15 years 3 months ago
Extracting Discriminative Information from Medical Images: A Multivariate Linear Approach
Statistical discrimination methods are suitable not only for classification but also for characterisation of differences between a reference group of patterns and the population u...
Carlos E. Thomaz, Nelson A. O. Aguiar, Sergio H. A...
CIE
2010
Springer
14 years 9 months ago
Computable Ordered Abelian Groups and Fields
Abstract. We present transformations of linearly ordered sets into ordered abelian groups and ordered fields. We study effective properties of the transformations. In particular, w...
Alexander G. Melnikov
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb