Sciweavers

167 search results - page 17 / 34
» Comparing Two Notions of Simulatability
Sort
View
CRYPTO
2000
Springer
110views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
Parallel Reducibility for Information-Theoretically Secure Computation
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
Yevgeniy Dodis, Silvio Micali
PAKDD
2011
ACM
419views Data Mining» more  PAKDD 2011»
13 years 27 days ago
DISC: Data-Intensive Similarity Measure for Categorical Data
Abstract. The concept of similarity is fundamentally important in almost every scientific field. Clustering, distance-based outlier detection, classification, regression and sea...
Aditya Desai, Himanshu Singh, Vikram Pudi
ISBI
2006
IEEE
14 years 10 months ago
Group mean differences of voxel and surface objects via nonlinear averaging
Building of atlases representing average and variability of a population of images or of segmented objects is a key topic in application areas like brain mapping, deformable objec...
Shun Xu, Martin Andreas Styner, Brad Davis, Sarang...
ITC
1999
IEEE
98views Hardware» more  ITC 1999»
14 years 2 months ago
A design diversity metric and reliability analysis for redundant systems
Design diversity has long been used to protect redundant systems against common-mode failures. The conventional notion of diversity relies on "independent" generation of...
Subhasish Mitra, Nirmal R. Saxena, Edward J. McClu...
LICS
1999
IEEE
14 years 2 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson