Sciweavers

556 search results - page 51 / 112
» Generic Properties of Datatypes
Sort
View
103
Voted
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
89
Voted
JFP
2006
88views more  JFP 2006»
15 years 15 days ago
Type-based confinement
Confinement properties impose a structure on object graphs which can be used to enforce encapsulation properties. From a practical point of view, encapsulation is essential for bu...
Tian Zhao, Jens Palsberg, Jan Vitek
106
Voted
TCS
1998
15 years 5 days ago
Bubbles in Modularity
We provide a global technique, called neatening, for the study of modularity of left-linear Term Rewriting Systems. Objects called bubbles are identi ed as the responsibles of mos...
Massimo Marchiori
136
Voted
JMLR
2010
173views more  JMLR 2010»
14 years 7 months ago
Elliptical slice sampling
Many probabilistic models introduce strong dependencies between variables using a latent multivariate Gaussian distribution or a Gaussian process. We present a new Markov chain Mo...
Iain Murray, Ryan Prescott Adams, David J. C. MacK...
128
Voted
ISPEC
2011
Springer
14 years 3 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang