Sciweavers

1257 search results - page 10 / 252
» A generalization of Euler's constant
Sort
View
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
13 years 5 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
CRYPTO
2006
Springer
119views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Rankin's Constant and Blockwise Lattice Reduction
Abstract Lattice reduction is a hard problem of interest to both publickey cryptography and cryptanalysis. Despite its importance, extremely few algorithms are known. The best algo...
Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Ph...
CVPR
2004
IEEE
14 years 9 months ago
Space-Time Isosurface Evolution for Temporally Coherent 3D Reconstruction
We model the dynamic geometry of a time-varying scene as a 3D isosurface in space-time. The intersection of the isosurface with planes of constant time yields the geometry at a si...
Bastian Goldlücke, Marcus A. Magnor
SIAMAM
2008
93views more  SIAMAM 2008»
13 years 7 months ago
Partially Reflected Diffusion
The radiation (reactive or Robin) boundary condition for the diffusion equation is widely used in chemical and biological applications to express reactive boundaries. The underlyin...
A. Singer, Z. Schuss, A. Osipov, D. Holcman
GLVLSI
2011
IEEE
351views VLSI» more  GLVLSI 2011»
12 years 11 months ago
Design of low-power multiple constant multiplications using low-complexity minimum depth operations
Existing optimization algorithms for the multiplierless realization of multiple constant multiplications (MCM) typically target the minimization of the number of addition and subt...
Levent Aksoy, Eduardo Costa, Paulo F. Flores, Jos&...