Sciweavers

929 search results - page 178 / 186
» An interaction initiative model for documentation
Sort
View
ASIACRYPT
2008
Springer
13 years 9 months ago
Universally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . , MN and a Receiver with indices 1, . . . , k [1, N] interact in such a way that at the end the Receiver ...
Matthew Green, Susan Hohenberger
SIMPRA
2008
106views more  SIMPRA 2008»
13 years 7 months ago
CEST and MEST: Tools for the simulation of radio frequency electric discharges in waveguides
In this paper we present two software tools for the simulation of electron multiplication processes in radio frequency (RF) waveguides. The electric discharges are caused by the m...
Francisco Pérez, Juan de Lara, Luis Conde, ...
PAMI
2012
11 years 10 months ago
Fast Joint Estimation of Silhouettes and Dense 3D Geometry from Multiple Images
—We propose a probabilistic formulation of joint silhouette extraction and 3D reconstruction given a series of calibrated 2D images. Instead of segmenting each image separately i...
Kalin Kolev, Thomas Brox, Daniel Cremers
NAR
2010
143views more  NAR 2010»
13 years 2 months ago
WormBase: a comprehensive resource for nematode research
WormBase (http://www.wormbase.org) is a central data repository for nematode biology. Initially created as a service to the Caenorhabditis elegans research field, WormBase has evo...
Todd W. Harris, Igor Antoshechkin, Tamberlyn Bieri...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 2 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...