Sciweavers

925 search results - page 57 / 185
» Connectivity on Complete Lattices
Sort
View
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
ICIP
2007
IEEE
16 years 1 months ago
Conditions for Color Misregistration Sensitivity in Clustered-dot Halftones
Misregistration between the color separations of a printed image, which is often inevitable, can cause objectionable color shifts in average color. We analyze the impact of inter-...
Basak Oztan, Gaurav Sharma, Robert P. Loce
BIRTHDAY
2009
Springer
15 years 6 months ago
Polynomial Precise Interval Analysis Revisited
We consider a class of arithmetic equations over the complete lattice of integers (extended with −∞ and ∞) and provide a polynomial time algorithm for computing least solutio...
Thomas Gawlitza, Jérôme Leroux, Jan R...
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
15 years 6 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...
ICASSP
2008
IEEE
15 years 6 months ago
An unsupervised web-based topic language model adaptation method
This paper focuses on a solution to better adapt ASR systems, whose language models (LM) are usually trained on topic-independent corpora, to new topics, in particular in the case...
Gwénolé Lecorvé, Guillaume Gr...