Sciweavers

321 search results - page 34 / 65
» Randomness extractors -- applications and constructions
Sort
View
IV
2010
IEEE
214views Visualization» more  IV 2010»
13 years 7 months ago
A System for Real-Time Transcoding and Delivery of Video to Smartphones
—This paper presents a report of a system that delivers customized video content to mobile devices. Constructed from open source components, it can stream transcoded video to mob...
Lior D. Shefer, Francis T. Marchese
PROVSEC
2007
Springer
14 years 2 months ago
Decryptable Searchable Encryption
As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This pa...
Thomas Fuhr, Pascal Paillier
AINA
2010
IEEE
14 years 1 months ago
The Power of Orientation in Symmetry-Breaking
—Symmetry breaking is a fundamental operation in distributed computing. It has applications to important problems such as graph vertex and edge coloring, maximal independent sets...
Satya Krishna Pindiproli, Kishore Kothapalli
TNN
2011
129views more  TNN 2011»
13 years 3 months ago
Minimum Complexity Echo State Network
—Reservoir computing (RC) refers to a new class of state-space models with a fixed state transition structure (the “reservoir”) and an adaptable readout form the state space...
Ali Rodan, Peter Tino
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 11 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman