Sciweavers

15351 search results - page 99 / 3071
» The information bottleneck method
Sort
View
117
Voted
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 3 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
107
Voted
CONTEXT
2001
Springer
15 years 5 months ago
WordSieve: A Method for Real-Time Context Extraction
Abstract. In order to be useful, intelligent information retrieval agents must provide their users with context-relevant information. This paper presents WordSieve, an algorithm fo...
Travis Bauer, David B. Leake
90
Voted
CAV
2009
Springer
128views Hardware» more  CAV 2009»
15 years 7 months ago
Modelling Epigenetic Information Maintenance: A Kappa Tutorial
Jean Krivine, Vincent Danos, Arndt Benecke
97
Voted
DAC
1997
ACM
15 years 4 months ago
Multi-Way FPGA Partitioning by Fully Exploiting Design Hierarchy
In this paper, we present a new integrated synthesis and partitioning method for multiple-FPGA applications. This method rst synthesizes a design speci cation in a ne-grained way ...
Wen-Jong Fang, Allen C.-H. Wu
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
16 years 2 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal