Sciweavers

127 search results - page 25 / 26
» On Cryptographic Schemes Based on Discrete Logarithms and Fa...
Sort
View
EUROCRYPT
2007
Springer
14 years 2 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
PAISI
2010
Springer
13 years 5 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
MEDIAFORENSICS
2010
13 years 6 months ago
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
Anindya Sarkar, B. S. Manjunath
CONCURRENCY
2010
172views more  CONCURRENCY 2010»
13 years 5 months ago
Modeling of tsunami waves and atmospheric swirling flows with graphics processing unit (GPU) and radial basis functions (RBF)
The faster growth curves in the speed of GPUs relative to CPUs in the past decade and its rapidly gained popularity have spawned a new area of development in computational technol...
Jessica Schmidt, Cécile Piret, Nan Zhang, B...
KES
2005
Springer
14 years 1 months ago
Optimal Remediation Design in Groundwater Systems by Intelligent Techniques
Abstract. This research develops an optimal planning model for pump-treatinject based groundwater remediation systems. Optimizing the design of the pump-treat-inject system is a no...
Hone-Jay Chu, Chin-Tsai Hsiao, Liang-Cheng Chang