Sciweavers

841 search results - page 81 / 169
» Constructions for Clumps Statistics
Sort
View
CRYPTO
2001
Springer
144views Cryptology» more  CRYPTO 2001»
15 years 4 months ago
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
In this paper we show that any two-party functionality can be securely computed in a constant number of rounds, where security is obtained against malicious adversaries that may ar...
Yehuda Lindell
ICMCS
2000
IEEE
141views Multimedia» more  ICMCS 2000»
15 years 4 months ago
Content-Based Indexing and Retrieval of Audio Data using Wavelets
This paper proposes a content-based audio information retrieval and indexing technique based on wavelet transform. The presented approach uses multiresolution decomposition proper...
Guohui Li, Ashfaq A. Khokhar
CDC
2009
IEEE
155views Control Systems» more  CDC 2009»
15 years 3 months ago
Improved independent component regression modeling
The conventional independent component regression (ICR), as an exclusive two-step implementation algorithm, has the risk similar to principal component regression (PCR). That is, t...
Chunhui Zhao, Furong Gao, Tao Liu, Fuli Wang
ICAIL
2007
ACM
15 years 3 months ago
Deep semantic interpretations of legal texts
One of the main obstacles to progress in the field of artificial intelligence and law is the natural language barrier, but the technology of natural language processing has advanc...
L. Thorne McCarty
FSE
2006
Springer
174views Cryptology» more  FSE 2006»
15 years 3 months ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar