Sciweavers

511 search results - page 67 / 103
» Reconstruction Using Witness Complexes
Sort
View
FOCS
2007
IEEE
15 years 4 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
CIBCB
2007
IEEE
15 years 4 months ago
An Experimental Evaluation of Inversion-and Transposition-Based Genomic Distances through Simulations
— Rearrangements of genes and other syntenic blocks have become a topic of intensive study by phylogenists, comparative genomicists, and computational biologists: they are a feat...
Moulik Kothari, Bernard M. E. Moret
ACNS
2010
Springer
134views Cryptology» more  ACNS 2010»
14 years 10 months ago
Efficient and Secure Evaluation of Multivariate Polynomials and Applications
In this work, we design two-party and multiparty protocols for evaluating multivariate polynomials at participants' inputs with security against a malicious adversary who may ...
Matthew K. Franklin, Payman Mohassel
ICIP
2008
IEEE
15 years 11 months ago
Compressive image fusion
Compressive sensing (CS) has received a lot of interest due to its compression capability and lack of complexity on the sensor side. In this paper, we present a study of three sam...
Tao Wan, Cedric Nishan Canagarajah, Alin Achim
ACG
2009
Springer
15 years 4 months ago
Solving Kriegspiel Endings with Brute Force: The Case of KR vs. K
Retrograde analysis is a tool for reconstructing a game tree starting from its leaves; with these techniques one can solve specific subsets of a complex game, achieving optimal pl...
Paolo Ciancarini, Gian Piero Favini