Sciweavers

2206 search results - page 350 / 442
» On the power of coercion abstraction
Sort
View
ECCC
2007
144views more  ECCC 2007»
13 years 10 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
KES
2008
Springer
13 years 10 months ago
Classification of Hyperspectral Images Compressed through 3D-JPEG2000
Abstract. Classification of hyperspectral images is paramount to an increasing number of user applications. With the advent of more powerful technology, sensed images demand for la...
Ian Blanes, Alaitz Zabala, Gerard Moré, Xav...
JSAC
2006
85views more  JSAC 2006»
13 years 10 months ago
Transmit selection diversity with maximal-ratio combining for multicarrier DS-CDMA wireless networks over Nakagami-m fading chan
Abstract--We propose the scheme to integrate transmit selection diversity/maximal-ratio combining (TSD/MRC) with multicarrier (MC) direct-sequence code-division multiple access (DS...
Jia Tang, Xi Zhang
JSW
2006
98views more  JSW 2006»
13 years 10 months ago
A Jxta Based Asynchronous Peer-to-Peer Implementation of Genetic Programming
Abstract-- Solving complex real-world problems using evolutionary computation is a CPU time-consuming task that requires a large amount of computational resources. Peerto-Peer (P2P...
Gianluigi Folino, Agostino Forestiero, Giandomenic...
JUCS
2006
86views more  JUCS 2006»
13 years 10 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...