Sciweavers

905 search results - page 117 / 181
» Public key distribution through
Sort
View
PAA
2010
13 years 3 months ago
Identification of scripts and orientations of degraded document images
This paper presents a pair of identification technique that automatically detect scripts and orientations of document images suffering from various types of document degradation. ...
Shijian Lu, Linlin Li, Chew Lim Tan
EUROCRYPT
2012
Springer
11 years 11 months ago
Fully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorp...
Craig Gentry, Shai Halevi, Nigel P. Smart
SIGMOD
2008
ACM
154views Database» more  SIGMOD 2008»
14 years 8 months ago
SEMMO: a scalable engine for massively multiplayer online games
We propose to demonstrate SEMMO, a consistency server for MMOs. The key features of SEMMO are its novel distributed consistency protocol and system architecture. The distributed n...
Nitin Gupta 0003, Alan J. Demers, Johannes Gehrke
GLOBECOM
2009
IEEE
14 years 3 months ago
Robust Cooperative Relaying in a Wireless LAN: Cross-Layer Design and Performance Analysis
—A key technology in cooperative communications is distributed space-time coding (DSTC) which achieves spatial diversity gain from multiple relays. A novel DSTC, called randomize...
Pei Liu, Chun Nie, Elza Erkip, Shivendra S. Panwar
ISPDC
2008
IEEE
14 years 3 months ago
Load Balancing in Mesh-like Computations using Prediction Binary Trees
We present a load-balancing technique that exploits the temporal coherence, among successive computation phases, in mesh-like computations to be mapped on a cluster of processors....
Biagio Cosenza, Gennaro Cordasco, Rosario De Chiar...