Sciweavers

5752 search results - page 244 / 1151
» Informative Labeling Schemes
Sort
View
CORR
2010
Springer
140views Education» more  CORR 2010»
15 years 2 months ago
On Scaling Laws of Diversity Schemes in Decentralized Estimation
This paper is concerned with decentralized estimation of a Gaussian source using multiple sensors. We consider a diversity scheme where only the sensor with the best channel sends...
Alex S. Leong, Subhrakanti Dey
EUROCRYPT
2004
Springer
15 years 9 months ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold
JUCS
2008
156views more  JUCS 2008»
15 years 4 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
TMI
1998
97views more  TMI 1998»
15 years 3 months ago
Optimization and FROC Analysis of Rule-Based Detection Schemes Using a Multiobjective Approach
Abstract—Computerized detection schemes have the potential of increasing diagnostic accuracy in medical imaging by alerting radiologists to lesions that they initially overlooked...
Mark A. Anastasio, Matthew A. Kupinski, Robert M. ...
EUROCRYPT
2010
Springer
15 years 8 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...