Sciweavers

5752 search results - page 165 / 1151
» Informative Labeling Schemes
Sort
View
ASIACRYPT
2008
Springer
15 years 5 months ago
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
In this paper, we show that two variants of Stern's identification scheme [IEEE Transaction on Information Theory '96] are provably secure against concurrent attack unde...
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
109
Voted
INTERACT
2003
15 years 4 months ago
Classification of Usability Problems (CUP) Scheme
: Defect classification can improve product quality and motivate process improvement. Several defect classification schemes have been developed and used with good results in softwa...
Ebba Thora Hvannberg, Effie Lai-Chong Law
135
Voted
TIT
2010
170views Education» more  TIT 2010»
14 years 10 months ago
Correcting charge-constrained errors in the rank-modulation scheme
We investigate error-correcting codes for a the rank-modulation scheme with an application to flash memory devices. In this scheme, a set of n cells stores information in the permu...
Anxiao Jiang, Moshe Schwartz, Jehoshua Bruck
ICDM
2006
IEEE
93views Data Mining» more  ICDM 2006»
15 years 9 months ago
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks
Recently K-anonymity has gained popularity as a privacy quantification against linking attacks, in which attackers try to identify a record with values of some identifying attrib...
Zhouxuan Teng, Wenliang Du
WSCG
2003
144views more  WSCG 2003»
15 years 4 months ago
Progressive Transmission of Polyhedral Solids Using a Hierarchical Representation Scheme
In the last years several 3D model compression methods for multiresolution applications have been presented, most of them using 3D meshes. Octrees are a natural multiresolution re...
Pedro Cano, Juan Carlos Torres, Francisco Velasco