Sciweavers

34170 search results - page 6820 / 6834
» Optimization
Sort
View
TOG
2012
184views Communications» more  TOG 2012»
13 years 1 days ago
Image melding: combining inconsistent images using patch-based synthesis
Current methods for combining two different images produce visible artifacts when the sources have very different textures and structures. We present a new method for synthesizing...
Soheil Darabi, Eli Shechtman, Connelly Barnes, Dan...
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 1 days ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
13 years 1 days ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
ISSTA
2012
ACM
13 years 1 days ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
KDD
2012
ACM
196views Data Mining» more  KDD 2012»
13 years 1 days ago
Chromatic correlation clustering
We study a novel clustering problem in which the pairwise relations between objects are categorical. This problem can be viewed as clustering the vertices of a graph whose edges a...
Francesco Bonchi, Aristides Gionis, Francesco Gull...
« Prev « First page 6820 / 6834 Last » Next »