We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from ËœO(Î...
— Spectrum handoff occurs when the primary users appear in the licensed band occupied by the secondary users. Spectrum handoff procedures aim to help the secondary users to vacat...
In this paper we propose a new tabu search hyperheuristic which makes individual low level heuristics tabu dynamically using an analogy with the Binary Exponential Back Off (BEBO) ...
Stephen Remde, Keshav P. Dahal, Peter I. Cowling, ...
In this paper we propose an improved motion estimation algorithm based on Evolutionary strategy (ES) for H.264 video codec applied to video. The proposed technique works in a para...
S. Mayuran, Warnakulasuriya Anil Chandana Fernando...
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...