Sciweavers

725 search results - page 46 / 145
» A Generalization of Repetition Threshold
Sort
View
152
Voted
WWW
2010
ACM
15 years 10 months ago
Inferring relevant social networks from interpersonal communication
Researchers increasingly use electronic communication data to construct and study large social networks, effectively inferring unobserved ties (e.g. i is connected to j) from obs...
Munmun De Choudhury, Winter A. Mason, Jake M. Hofm...
EUROCRYPT
1999
Springer
15 years 7 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
ICIP
2005
IEEE
16 years 5 months ago
Segmenting small regions in the presence of noise
Binary segmentation, a problem of extracting foreground objects from the background, often arises in medical imaging and document processing. Popular existing solutions include Ex...
Rashi Samur, Vitali Zagorodnov
327
Voted
PODS
2009
ACM
229views Database» more  PODS 2009»
16 years 4 months ago
Computing all skyline probabilities for uncertain data
Skyline computation is widely used in multi-criteria decision making. As research in uncertain databases draws increasing attention, skyline queries with uncertain data have also ...
Mikhail J. Atallah, Yinian Qi
128
Voted
GLVLSI
2009
IEEE
167views VLSI» more  GLVLSI 2009»
15 years 10 months ago
Dual-threshold pass-transistor logic design
This paper introduces pass-transistor logic design with dualthreshold voltages. A set of single-rail, fully restored, passtransistor gates are presented. Logic transistors are imp...
Lara D. Oliver, Krishnendu Chakrabarty, Hisham Z. ...