Sciweavers

373 search results - page 66 / 75
» Combining Speech Retrieval Results with Generalized Additive...
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
14 years 1 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
SIAMJO
2010
155views more  SIAMJO 2010»
13 years 2 months ago
Optimal Portfolio Execution Strategies and Sensitivity to Price Impact Parameters
When liquidating a portfolio of large blocks of risky assets, an institutional investor wants to minimize the cost as well as the risk of execution. An optimal execution strategy ...
Somayeh Moazeni, Thomas F. Coleman, Yuying Li
MICCAI
2003
Springer
14 years 8 months ago
Robust Estimation for Brain Tumor Segmentation
Given models for healthy brains, tumor segmentation can be seen as a process of detecting abnormalities or outliers that are present with certain image intensity and geometric prop...
Marcel Prastawa, Elizabeth Bullitt, Sean Ho, Guido...
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 8 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
EWSN
2007
Springer
14 years 7 months ago
Removing Systematic Error in Node Localisation Using Scalable Data Fusion
Methods for node localisation in sensor networks usually rely upon the measurement of received strength, time-of-arrival, and/or angle-of-arrival of an incoming signal. In this pap...
Albert Krohn, Mike Hazas, Michael Beigl