Sciweavers

929 search results - page 40 / 186
» On Computation and Communication with Small Bias
Sort
View
ISW
2010
Springer
13 years 6 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
ECCC
2010
98views more  ECCC 2010»
13 years 7 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
EDCC
2010
Springer
14 years 1 months ago
Dependability Analysis of Diffusion Protocols in Wireless Networks with Heterogeneous Node Capabilities
Wireless networks are starting to be populated by interconnected devices that reveal remarkable hardware and software differences. This fact raises a number of questions on the ap...
Paolo Masci, Silvano Chiaradonna, Felicita Di Gian...
CRYPTO
2006
Springer
104views Cryptology» more  CRYPTO 2006»
14 years 12 days ago
Random Selection with an Adversarial Majority
Abstract. We consider the problem of random selection, where p players follow a protocol to jointly select a random element of a universe of size n. However, some of the players ma...
Ronen Gradwohl, Salil P. Vadhan, David Zuckerman
CVPR
2007
IEEE
14 years 10 months ago
Shape Representation and Registration using Vector Distance Functions
This paper introduces a new method for shape registration by matching vector distance functions. The vector distance function representation is more flexible than the conventional...
Hossam E. Abd El Munim, Aly A. Farag