Sciweavers

1446 search results - page 24 / 290
» Local zero knowledge
Sort
View
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 6 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to aâ€...
Jörn Müller-Quade, Dominique Unruh
ICIP
1998
IEEE
16 years 1 months ago
Generalized Hermite Polynomials for Image Reconstruction from Zero Crossing Contours
Generalized Hermite polynomials in two variables are employed for the reconstruction of images from a knowledge of their zero crossing contours. The problem of reconstruction of s...
Y. V. Venkatesh
ICS
2009
Tsinghua U.
15 years 6 months ago
Cancellation of loads that return zero using zero-value caches
The speed gap between processor and memory continues to limit performance. To address this problem, we explore the potential of eliminating Zero Loads—loads accessing memory loc...
Md. Mafijul Islam, Sally A. McKee, Per Stenstr&oum...
GLOBECOM
2006
IEEE
15 years 5 months ago
Distributed Multi-Cell Zero-Forcing Beamforming in Cellular Downlink Channels
Abstract— For a multiple-input single-output (MISO) downlink channel with ¢ transmit antennas, it has been recently proved that zero-forcing beamforming (ZFBF) to a subset of (a...
Oren Somekh, Osvaldo Simeone, Yeheskel Bar-Ness, A...
DOCENG
2004
ACM
15 years 5 months ago
Creation of topic map by identifying topic chain in chinese
XML Topic maps enable multiple, concurrent views of sets of information objects and can be used to different applications. For example, thesaurus-like interfaces to corpora, navig...
Ching-Long Yeh, Yi-Chun Chen