Sciweavers

556 search results - page 51 / 112
» Generic Properties of Datatypes
Sort
View
117
Voted
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
108
Voted
JFP
2006
88views more  JFP 2006»
15 years 2 months ago
Type-based confinement
Confinement properties impose a structure on object graphs which can be used to enforce encapsulation properties. From a practical point of view, encapsulation is essential for bu...
Tian Zhao, Jens Palsberg, Jan Vitek
121
Voted
TCS
1998
15 years 2 months ago
Bubbles in Modularity
We provide a global technique, called neatening, for the study of modularity of left-linear Term Rewriting Systems. Objects called bubbles are identi ed as the responsibles of mos...
Massimo Marchiori
151
Voted
JMLR
2010
173views more  JMLR 2010»
14 years 9 months ago
Elliptical slice sampling
Many probabilistic models introduce strong dependencies between variables using a latent multivariate Gaussian distribution or a Gaussian process. We present a new Markov chain Mo...
Iain Murray, Ryan Prescott Adams, David J. C. MacK...
154
Voted
ISPEC
2011
Springer
14 years 5 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang