Sciweavers

242 search results - page 24 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
WWW
2003
ACM
15 years 10 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
ICALP
2001
Springer
15 years 2 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung
86
Voted
FOCS
2006
IEEE
15 years 3 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
MVA
2002
178views Computer Vision» more  MVA 2002»
14 years 9 months ago
Advanced Image Retrieval Using Multi-resolution Image Content
We introduce an image retrieval method for searchingan image database by using a query image that has similarity in its global and/or regional image contents to the intended targe...
Motohide Yoshimura, Hajime Kiyose, Shigeo Abe
78
Voted
ISCAS
2008
IEEE
171views Hardware» more  ISCAS 2008»
15 years 3 months ago
Statistical image modeling using von Mises distribution in the complex directional wavelet domain
— In this paper, a new statistical model is proposed for modeling the nature images in the transform domain. We demonstrate that the von Mises distribution (VM) fits accurately ...
An P. N. Vo, Soontorn Oraintara, Truong T. Nguyen