Sciweavers

1066 search results - page 16 / 214
» Computing Private Set Operations with Linear Complexities
Sort
View
105
Voted
COCO
2008
Springer
97views Algorithms» more  COCO 2008»
15 years 4 months ago
Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-prover Interactive Proof Systems
A central question in quantum information theory and computational complexity is how powerful nonlocal strategies are in cooperative games with imperfect information, such as mult...
Tsuyoshi Ito, Hirotada Kobayashi, Daniel Preda, Xi...
123
Voted
VLDB
2005
ACM
114views Database» more  VLDB 2005»
15 years 8 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
112
Voted
SIBGRAPI
2006
IEEE
15 years 8 months ago
Extracting Discriminative Information from Medical Images: A Multivariate Linear Approach
Statistical discrimination methods are suitable not only for classification but also for characterisation of differences between a reference group of patterns and the population u...
Carlos E. Thomaz, Nelson A. O. Aguiar, Sergio H. A...
132
Voted
CIE
2010
Springer
15 years 3 months ago
Computable Ordered Abelian Groups and Fields
Abstract. We present transformations of linearly ordered sets into ordered abelian groups and ordered fields. We study effective properties of the transformations. In particular, w...
Alexander G. Melnikov
121
Voted
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
15 years 4 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb