Sciweavers

1089 search results - page 88 / 218
» Randomness and Reducibility
Sort
View
EUROCRYPT
2012
Springer
12 years 20 days ago
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from ËœO(Î...
Jean-Sébastien Coron, David Naccache, Mehdi...
ICC
2009
IEEE
325views Communications» more  ICC 2009»
14 years 5 months ago
Modeling and Analysis for Proactive-Decision Spectrum Handoff in Cognitive Radio Networks
— Spectrum handoff occurs when the primary users appear in the licensed band occupied by the secondary users. Spectrum handoff procedures aim to help the secondary users to vacat...
Chung-Wang Wang, Li-Chung Wang
EVOW
2009
Springer
14 years 5 months ago
Binary Exponential Back Off for Tabu Tenure in Hyperheuristics
In this paper we propose a new tabu search hyperheuristic which makes individual low level heuristics tabu dynamically using an analogy with the Binary Exponential Back Off (BEBO) ...
Stephen Remde, Keshav P. Dahal, Peter I. Cowling, ...
CCECE
2006
IEEE
14 years 4 months ago
Evolutionary Strategy Based Improved Motion Estimation Technique for H.264 Video Coding
In this paper we propose an improved motion estimation algorithm based on Evolutionary strategy (ES) for H.264 video codec applied to video. The proposed technique works in a para...
S. Mayuran, Warnakulasuriya Anil Chandana Fernando...
ICICS
2005
Springer
14 years 3 months ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen