Sciweavers

3206 search results - page 56 / 642
» Functional Variant Modeling for Adaptable Functional Network...
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
14 years 1 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic
NIPS
1994
13 years 9 months ago
Learning to Play the Game of Chess
This paper presents NeuroChess, a program which learns to play chess from the final outcome of games. NeuroChess learns chess board evaluation functions, represented by artificial...
Sebastian Thrun
SCN
2008
Springer
13 years 7 months ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos
NN
2008
Springer
101views Neural Networks» more  NN 2008»
13 years 7 months ago
On multidimensional scaling and the embedding of self-organising maps
The self-organising map (SOM) and its variant, visualisation induced SOM (ViSOM), have been known to yield similar results to multidimensional scaling (MDS). However, the exact co...
Hujun Yin