Sciweavers

141 search results - page 10 / 29
» Oblivious Transfer and Linear Functions
Sort
View
IJACTAICIT
2010
127views more  IJACTAICIT 2010»
13 years 8 months ago
New Proposed Algorithms for nth Order Butterworth Active Filter Computer-Aided Design
This paper describes new proposed algorithms for constructing the transfer function of nth order Butterworth LPF using the idea of the cascade combination of active filters. Compu...
Haider Fakher Radhi Al-Saidy
CORR
2007
Springer
146views Education» more  CORR 2007»
13 years 11 months ago
Coding for Errors and Erasures in Random Network Coding
Abstract—The problem of error-control in random linear network coding is considered. A “noncoherent” or “channel oblivious” model is assumed where neither transmitter nor...
Ralf Koetter, Frank R. Kschischang
MSS
2003
IEEE
81views Hardware» more  MSS 2003»
14 years 4 months ago
SPIRAL: A Client-Transparent Third-Party Transfer Scheme for Network Attached Disks
Third-party transfer is a data transfer mechanism where the party initiating the transfer is neither the source nor the sink for the data. In this paper, we present a scheme for s...
Xiaonan Ma, A. L. Narasimha Reddy
SCL
2008
87views more  SCL 2008»
13 years 10 months ago
Stabilizability of two-dimensional linear systems via switched output feedback
The problem of stabilizing a second-order SISO LTI system of the form x = Ax + Bu, y = Cx with feedback of the form u(x) = v(x)Cx is considered, where v(x) is real-valued and has ...
Keith R. Santarelli, Alexandre Megretski, Munther ...
ICISC
2008
103views Cryptology» more  ICISC 2008»
14 years 11 days ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003