This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
We present a fast hardware-accelerated stippling method which does not require any preprocessing for placing points on surfaces. The surfaces are automatically parameterized in or...
Alexandra Baer, Christian Tietjen, Ragnar Bade, Be...
We introduce a new, generic framework for private data analysis. The goal of private data analysis is to release aggregate information about a data set while protecting the privac...
Literature on information integration across databases tacitly assumes that the data in each database can be revealed to the other databases. However, there is an increasing need ...
Rakesh Agrawal, Alexandre V. Evfimievski, Ramakris...
Background: We propose a method for deriving enzymatic signatures from short read metagenomic data of unknown species. The short read data are converted to six pseudo-peptide cand...