Sciweavers

1272 search results - page 66 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 3 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
CCS
2006
ACM
14 years 25 days ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
IEAAIE
2010
Springer
13 years 7 months ago
Psychophysical Evaluation for a Qualitative Semantic Image Categorisation and Retrieval Approach
This paper details the behavioral evaluation of a qualitative image categorisation and retrieval approach using semantic features of images. Content based image retrieval and class...
Zia Ul-Qayyum, A. G. Cohn, Alexander Klippel
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
14 years 3 months ago
Model-Based Nonlinear Observers for Underwater Vehicle Navigation: Theory and Preliminary Experiments
— This paper reports the analytical development and preliminary experimental evaluation of a class of exact nonlinear full state model-based observers for underwater vehicle navi...
James C. Kinsey, Louis L. Whitcomb
PPDP
2010
Springer
13 years 7 months ago
Towards a jitting VM for prolog execution
Most Prolog implementations are implemented in low-level languages such as C and are based on a variation of the WAM instruction set, which enhances their performance but makes th...
Carl Friedrich Bolz, Michael Leuschel, David Schne...