Sciweavers

10819 search results - page 184 / 2164
» Addition and multiplication of sets
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
14 years 2 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
ARITH
2005
IEEE
14 years 2 months ago
Table Lookup Structures for Multiplicative Inverses Modulo 2k
We introduce an inheritance property and related table lookup structures applicable to simplified evaluation of the modular operations “multiplicative inverse”, “discrete l...
David W. Matula, Alex Fit-Florea, Mitchell Aaron T...
ICRA
2009
IEEE
179views Robotics» more  ICRA 2009»
14 years 4 months ago
Automatic weight learning for multiple data sources when learning from demonstration
— Traditional approaches to programming robots are generally inaccessible to non-robotics-experts. A promising exception is the Learning from Demonstration paradigm. Here a polic...
Brenna Argall, Brett Browning, Manuela M. Veloso
PKC
2004
Springer
158views Cryptology» more  PKC 2004»
14 years 2 months ago
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism
Let E be an elliptic curve defined over F2n . The inverse operation of point doubling, called point halving, can be done up to three times as fast as doubling. Some authors have t...
Roberto Maria Avanzi, Mathieu Ciet, Francesco Sica
TIP
2008
124views more  TIP 2008»
13 years 9 months ago
Robust Shape Tracking With Multiple Models in Ultrasound Images
This paper addresses object tracking in ultrasound images using a robust multiple model tracker. The proposed tracker has the following features: 1) it uses multiple dynamic models...
Jacinto C. Nascimento, Jorge S. Marques