Sciweavers

540 search results - page 43 / 108
» Graph-based transfer learning
Sort
View
JUCS
2008
156views more  JUCS 2008»
14 years 10 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
BMCBI
2006
100views more  BMCBI 2006»
14 years 10 months ago
Using the nucleotide substitution rate matrix to detect horizontal gene transfer
Background: Horizontal gene transfer (HGT) has allowed bacteria to evolve many new capabilities. Because transferred genes perform many medically important functions, such as conf...
Micah Hamady, M. D. Betterton, Rob Knight
MM
2009
ACM
178views Multimedia» more  MM 2009»
15 years 4 months ago
Semantic context transfer across heterogeneous sources for domain adaptive video search
Automatic video search based on semantic concept detectors has recently received significant attention. Since the number of available detectors is much smaller than the size of h...
Yu-Gang Jiang, Chong-Wah Ngo, Shih-Fu Chang
EUROCRYPT
1999
Springer
15 years 2 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
EUROCRYPT
1997
Springer
15 years 1 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau