Sciweavers

141 search results - page 19 / 29
» Oblivious Transfer and Linear Functions
Sort
View
DAC
2008
ACM
14 years 20 days ago
DeMOR: decentralized model order reduction of linear networks with massive ports
Model order reduction is an efficient technique to reduce the system complexity while producing a good approximation of the input-output behavior. However, the efficiency of reduc...
Boyuan Yan, Lingfei Zhou, Sheldon X.-D. Tan, Jie C...
AUTOMATICA
2000
72views more  AUTOMATICA 2000»
13 years 10 months ago
Direct iterative tuning via spectral analysis
This paper introduces a nonparametric frequency-domain scheme for tuning closed-loop systems. A linear quadratic criterion is used for guiding the system towards an optimal-regula...
Leonardo C. Kammer, Robert R. Bitmead, Peter L. Ba...
SIGGRAPH
1994
ACM
14 years 3 months ago
A framework for the analysis of error in global illumination algorithms
In this paper we identify sources of error in global illumination algorithms and derive bounds for each distinct category. Errors arise from three sources: inaccuracies in the bou...
James Arvo, Kenneth E. Torrance, Brian E. Smits
FOCS
2009
IEEE
14 years 5 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
14 years 8 hour ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...