Sciweavers

28 search results - page 3 / 6
» Independent Database Schemes under Functional and Inclusion ...
Sort
View
TIT
2010
138views Education» more  TIT 2010»
13 years 1 months ago
Functional compression through graph coloring
Motivated by applications to sensor networks and privacy preserving databases, we consider the problem of functional compression. The objective is to separately compress possibly c...
Vishal Doshi, Devavrat Shah, Muriel Médard,...
CAV
1999
Springer
119views Hardware» more  CAV 1999»
13 years 11 months ago
A Theory of Restrictions for Logics and Automata
BDDs and their algorithms implement a decision procedure for Quanti ed Propositional Logic. BDDs are a kind of acyclic automata. Unrestricted automata (recognizing unbounded string...
Nils Klarlund
PTS
2008
100views Hardware» more  PTS 2008»
13 years 8 months ago
Model-Based Generation of Testbeds for Web Services
Abstract. A Web Service is commonly not an independent software entity, but plays a role in some business process. Hence, it depends on the services provided by external Web Servic...
Antonia Bertolino, Guglielmo De Angelis, Lars Fran...
TIT
1998
91views more  TIT 1998»
13 years 6 months ago
Multiaccess Fading Channels-Part II: Delay-Limited Capacities
—In multiaccess wireless systems, dynamic allocation of resources such as transmit power, bandwidths, and rates is an important means to deal with the time-varying nature of the ...
Stephen V. Hanly, David N. C. Tse
IACR
2011
196views more  IACR 2011»
12 years 6 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs