Sciweavers

69 search results - page 6 / 14
» Homomorphic Evaluation Requires Depth
Sort
View
ASIACRYPT
2010
Springer
13 years 7 months ago
Constant-Size Commitments to Polynomials and Their Applications
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
INFOCOM
2009
IEEE
14 years 4 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
CVIU
2008
296views more  CVIU 2008»
13 years 9 months ago
Image segmentation evaluation: A survey of unsupervised methods
Image segmentation is an important processing step in many image, video and computer vision applications. Extensive research has been done in creating many different approaches an...
Hui Zhang, Jason E. Fritts, Sally A. Goldman
CN
2000
95views more  CN 2000»
13 years 9 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
ECCV
2010
Springer
14 years 3 months ago
Programmable Aperture Camera Using LCoS
Since 1960s, aperture patterns have been studied extensively and a variety of coded apertures have been proposed for various applications, including extended depth of field, defocu...
Hajime Nagahara, Changyin Zhou, Takuya Watanabe, H...