Sciweavers

567 search results - page 19 / 114
» Reconstructing Numbers from Pairwise Function Values
Sort
View
ARITH
2005
IEEE
14 years 2 months ago
The Residue Logarithmic Number System: Theory and Implementation
— The Residue Logarithmic Number System (RLNS) represents real values as quantized logarithms which, in turn, are represented using the Residue Number System (RNS). Compared to t...
Mark G. Arnold
ICIP
2008
IEEE
14 years 3 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
CISS
2008
IEEE
14 years 3 months ago
1-Bit compressive sensing
Abstract—Compressive sensing is a new signal acquisition technology with the potential to reduce the number of measurements required to acquire signals that are sparse or compres...
Petros Boufounos, Richard G. Baraniuk
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
ECBS
2007
IEEE
119views Hardware» more  ECBS 2007»
14 years 2 months ago
IPOG: A General Strategy for T-Way Software Testing
Most existing work on t-way testing has focused on 2-way (or pairwise) testing, which aims to detect faults caused by interactions between any two parameters. However, faults can ...
Yu Lei, Raghu Kacker, D. Richard Kuhn, Vadim Okun,...