Sciweavers

206 search results - page 23 / 42
» Analysis of Multivariate Hash Functions
Sort
View
WSC
2008
13 years 12 months ago
On the approximation error in high dimensional model representation
Mathematical models are often described by multivariate functions, which are usually approximated by a sum of lower dimensional functions. A major problem is the approximation err...
Xiaoqun Wang
STOC
2005
ACM
103views Algorithms» more  STOC 2005»
14 years 10 months ago
New and improved constructions of non-malleable cryptographic protocols
We present a new constant round protocol for non-malleable zero-knowledge. Using this protocol as a subroutine, we obtain a new constant-round protocol for non-malleable commitmen...
Rafael Pass, Alon Rosen
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 5 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
ICIP
2000
IEEE
14 years 11 months ago
Clustered Component Analysis for FMRI Signal Estimation and Classification
In this paper, we introduce a method for estimating the statistically distinct neural responses in an sequence of functional magnetic resonance images (fMRI). The crux of our meth...
Charles A. Bouman, Sea Chen, Mark J. Lowe
SPIRE
2010
Springer
13 years 8 months ago
Fingerprinting Ratings for Collaborative Filtering - Theoretical and Empirical Analysis
Abstract. We consider fingerprinting methods for collaborative filtering (CF) systems. In general, CF systems show their real strength when supplied with enormous data sets. Earl...
Yoram Bachrach, Ralf Herbrich