Sciweavers

4498 search results - page 767 / 900
» How to Invent Functions
Sort
View
IACR
2011
196views more  IACR 2011»
14 years 3 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
176
Voted
SDM
2012
SIAM
305views Data Mining» more  SDM 2012»
13 years 6 months ago
Learning Hierarchical Relationships among Partially Ordered Objects with Heterogeneous Attributes and Links
Objects linking with many other objects in an information network may imply various semantic relationships. Uncovering such knowledge is essential for role discovery, data cleanin...
Chi Wang, Jiawei Han, Qi Li, Xiang Li, Wen-Pin Lin...
CVPR
2007
IEEE
16 years 5 months ago
On Constructing Facial Similarity Maps
Automatically determining facial similarity is a difficult and open question in computer vision. The problem is complicated both because it is unclear what facial features humans ...
Alex Holub, Yun-hsueh Liu, Pietro Perona
145
Voted
VIS
2007
IEEE
128views Visualization» more  VIS 2007»
16 years 4 months ago
Modeling Perceptual Dominance Among Visual Cues in Multilayered Icon-based Scientific Visualizations
ization method is an abstract function that transforms a scientific dataset into a visual representation to facilitate data exploration. In turn, a visualization display is the vis...
Daniel Acevedo, Jian Chen, David H. Laidlaw
DAC
2000
ACM
16 years 4 months ago
Fingerprinting intellectual property using constraint-addition
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
Gang Qu, Miodrag Potkonjak