Sciweavers

49 search results - page 6 / 10
» Cryptography with Constant Input Locality
Sort
View
CCS
2008
ACM
13 years 11 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
IACR
2011
127views more  IACR 2011»
12 years 9 months ago
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Secure multiparty computation (MPC) allows a set of n players to compute any public function, given as an arithmetic circuit, on private inputs, so that privacy of the inputs as we...
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
ICASSP
2008
IEEE
14 years 4 months ago
Phase singularities for image representation and matching
Phase features are widely used in image processing and representation due to their stability to deformation and noise [1, 2]. However, phase singularities,where the signals vanish...
Yu Qiao, Wei Wang, Nobuaki Minematsu, Jianzhuang L...
ICIP
2005
IEEE
14 years 11 months ago
Adaptive edge enhancement using a neurodynamical model of visual attention
A new approach for selective edge enhancement using unsharp masking is presented. This is based on the premise that biological vision and image reproduction share common principle...
Francesca Gasparini, Silvia Corchs, Raimondo Schet...
WAPCV
2004
Springer
14 years 3 months ago
Learning of Position-Invariant Object Representation Across Attention Shifts
Abstract. Selective attention shift can help neural networks learn invariance. We describe a method that can produce a network with invariance to changes in visual input caused by ...
Muhua Li, James J. Clark