Sciweavers

2144 search results - page 290 / 429
» Exact Flow Analysis
Sort
View
CORR
2010
Springer
178views Education» more  CORR 2010»
15 years 3 months ago
Enumerative Algorithms for the Shortest and Closest Lattice Vector Problems in Any Norm via M-Ellipsoid Coverings
We give an algorithm for solving the exact Shortest Vector Problem in n-dimensional lattices, in any norm, in deterministic 2O(n) time (and space), given poly(n)-sized advice that...
Daniel Dadush, Chris Peikert, Santosh Vempala
INFOCOM
2010
IEEE
15 years 3 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
CSFW
2012
IEEE
13 years 7 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
ECCV
2002
Springer
16 years 7 months ago
Sensitivity of Calibration to Principal Point Position
A common practice when carrying out self-calibration of a camera from one or more views is to start with a guess at the principal point. The general belief is that inaccuracies in...
Richard I. Hartley, Robert Kaucic
ICDE
2007
IEEE
126views Database» more  ICDE 2007»
16 years 6 months ago
Efficient Approximation Algorithms for Repairing Inconsistent Databases
We consider the problem of repairing a database that is inconsistent wrt a set of integrity constraints by updating numerical values. In particular, we concentrate on denial integ...
Andrei Lopatenko, Loreto Bravo