Sciweavers

3206 search results - page 56 / 642
» Functional Variant Modeling for Adaptable Functional Network...
Sort
View
EUROCRYPT
2000
Springer
15 years 3 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
15 years 5 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic
NIPS
1994
15 years 1 months ago
Learning to Play the Game of Chess
This paper presents NeuroChess, a program which learns to play chess from the final outcome of games. NeuroChess learns chess board evaluation functions, represented by artificial...
Sebastian Thrun
SCN
2008
Springer
14 years 11 months ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos
NN
2008
Springer
101views Neural Networks» more  NN 2008»
14 years 11 months ago
On multidimensional scaling and the embedding of self-organising maps
The self-organising map (SOM) and its variant, visualisation induced SOM (ViSOM), have been known to yield similar results to multidimensional scaling (MDS). However, the exact co...
Hujun Yin