Sciweavers

373 search results - page 31 / 75
» Nearness and uniform convergence
Sort
View
ACNS
2011
Springer
283views Cryptology» more  ACNS 2011»
12 years 11 months ago
On Hiding a Plaintext Length by Preencryption
It is a well known fact that encryption schemes cannot hide a plaintext length when it is unbounded. We thus admit that an approximation of it may leak and we focus on hiding its p...
Cihangir Tezcan, Serge Vaudenay
INFOCOM
2012
IEEE
12 years 6 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
MICCAI
1999
Springer
14 years 3 days ago
Rendering the Unfolded Cerebral Cortex
Classical volume rendering is computed by casting a bundle of parallel rays from a flat viewing plane onto the volume data set, and produces as such a spatially limited view of the...
Junfeng Guo, Ioan Alexandru Salomie, Rudi Deklerck...
CNHPCA
2009
Springer
14 years 2 months ago
Development of a Scalable Solver for the Earth's Core Convection
A scalable parallel solver is developed to simulate the Earth’s core convection. With the help from the “multiphysics” data structure and the restricted additive Schwarz prec...
Chao Yang, Ligang Li, Yunquan Zhang
CEC
2008
IEEE
14 years 2 months ago
Analysis of reproduction operator in Bacterial Foraging Optimization Algorithm
— One of the major driving forces of Bacterial Foraging Optimization Algorithm (BFOA) is the reproduction phenomenon of virtual bacteria each of which models one trial solution o...
Ajith Abraham, Arijit Biswas, Sambarta Dasgupta, S...