Sciweavers

915 search results - page 94 / 183
» Proof labeling schemes
Sort
View
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 2 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
WDAG
2009
Springer
147views Algorithms» more  WDAG 2009»
14 years 2 months ago
Compact Routing in Power-Law Graphs
Abstract. We adapt the compact routing scheme by Thorup and Zwick to optimize it for power-law graphs. We analyze our adapted routing scheme based on the theory of unweighted rando...
Wei Chen, Christian Sommer 0002, Shang-Hua Teng, Y...
SPAA
2006
ACM
14 years 2 months ago
On space-stretch trade-offs: upper bounds
One of the fundamental trade-offs in compact routing schemes is between the space used to store the routing table on each node and the stretch factor of the routing scheme – th...
Ittai Abraham, Cyril Gavoille, Dahlia Malkhi
IACR
2011
158views more  IACR 2011»
12 years 7 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
CVPR
2009
IEEE
15 years 3 months ago
Localized Content-Based Image Retrieval Through Evidence Region Identification
Over the past decade, multiple-instance learning (MIL) has been successfully utilized to model the localized content-based image retrieval (CBIR) problem, in which a bag corresp...
Wu-Jun Li (Hong Kong University of Science and Tec...