Sciweavers

481 search results - page 80 / 97
» Martin's game: a lower bound for the number of sets
Sort
View
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
14 years 2 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
CCS
2003
ACM
14 years 2 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
ICCAD
2005
IEEE
94views Hardware» more  ICCAD 2005»
14 years 5 months ago
Post-placement voltage island generation under performance requirement
High power consumption not only leads to short battery life for handheld devices, but also causes on-chip thermal and reliability problems in general. As power consumption is prop...
Huaizhi Wu, I-Min Liu, Martin D. F. Wong, Yusu Wan...
TSP
2010
13 years 3 months ago
Distributed sampling of signals linked by sparse filtering: theory and applications
We study the distributed sampling and centralized reconstruction of two correlated signals, modeled as the input and output of an unknown sparse filtering operation. This is akin ...
Ali Hormati, Olivier Roy, Yue M. Lu, Martin Vetter...
ISBI
2011
IEEE
13 years 13 days ago
Fully automatic segmentation of wrist bones for arthritis patients
A reliable method to evaluate and follow the course of arthritis is given by examination of the carpal bones within the wrist joint. Humans typically have eight such small angular...
Martin Koch, Alexander G. Schwing, Dorin Comaniciu...