Sciweavers

51 search results - page 4 / 11
» Extractors from Reed-Muller codes
Sort
View
IACR
2011
125views more  IACR 2011»
12 years 7 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
ICASSP
2011
IEEE
12 years 11 months ago
The value of redundant measurement in compressed sensing
The aim of compressed sensing is to recover attributes of sparse signals using very few measurements. Given an overall bit budget for quantization, this paper demonstrates that th...
Victoria Kostina, Marco F. Duarte, Sina Jafarpour,...
WCRE
2005
IEEE
14 years 28 days ago
Source versus Object Code Extraction for Recovering Software Architecture
The architecture of many large software systems is rarely documented and if documented it is usually out of date. To support developers maintaining and evolving these systems, an ...
Ahmed E. Hassan, Zhen Ming Jiang, Richard C. Holt
COCO
2011
Springer
217views Algorithms» more  COCO 2011»
12 years 7 months ago
Noisy Interpolation of Sparse Polynomials, and Applications
Let f ∈ Fq[x] be a polynomial of degree d ≤ q/2. It is well-known that f can be uniquely recovered from its values at some 2d points even after some small fraction of the valu...
Shubhangi Saraf, Sergey Yekhanin
WCRE
2003
IEEE
14 years 19 days ago
Completeness of a Fact Extractor
The process of software reverse engineering commonly uses an extractor, which parses source code and extracts facts about the code. The level of detail in these facts varies from ...
Yuan Lin, Richard C. Holt, Andrew J. Malton