Sciweavers

29 search results - page 5 / 6
» On variants of the Johnson-Lindenstrauss lemma
Sort
View
CORR
2006
Springer
146views Education» more  CORR 2006»
13 years 7 months ago
Oblivious-Transfer Amplification
Abstract. Oblivious transfer (OT) is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality. Unfortunately...
Jürg Wullschleger
CADE
2007
Springer
14 years 7 months ago
Labelled Clauses
We add labels to first-order clauses to simultaneously apply superpositions to several proof obligations inside one clause set. From a theoretical perspective, the approach unifies...
Tal Lev-Ami, Christoph Weidenbach, Thomas W. Reps,...
FOCS
1998
IEEE
13 years 11 months ago
The Shortest Vector in a Lattice is Hard to Approximate to Within Some Constant
We show that approximating the shortest vector problem (in any p norm) to within any constant factor less than p 2 is hard for NP under reverse unfaithful random reductions with i...
Daniele Micciancio
FOCS
2004
IEEE
13 years 11 months ago
Extracting Randomness Using Few Independent Sources
In this work we give the first deterministic extractors from a constant number of weak sources whose entropy rate is less than 1/2. Specifically, for every > 0 we give an expl...
Boaz Barak, Russell Impagliazzo, Avi Wigderson
LREC
2008
121views Education» more  LREC 2008»
13 years 9 months ago
Prolexbase: a Multilingual Relational Lexical Database of Proper Names
This paper deals with a multilingual relational lexical database of proper name, Prolexbase, a free resource available on the CNRTL website. The Prolex model is based on two main ...
Denis Maurel