Sciweavers

511 search results - page 67 / 103
» Reconstruction Using Witness Complexes
Sort
View
FOCS
2007
IEEE
14 years 3 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
CIBCB
2007
IEEE
14 years 3 months ago
An Experimental Evaluation of Inversion-and Transposition-Based Genomic Distances through Simulations
— Rearrangements of genes and other syntenic blocks have become a topic of intensive study by phylogenists, comparative genomicists, and computational biologists: they are a feat...
Moulik Kothari, Bernard M. E. Moret
ACNS
2010
Springer
134views Cryptology» more  ACNS 2010»
13 years 9 months ago
Efficient and Secure Evaluation of Multivariate Polynomials and Applications
In this work, we design two-party and multiparty protocols for evaluating multivariate polynomials at participants' inputs with security against a malicious adversary who may ...
Matthew K. Franklin, Payman Mohassel
ICIP
2008
IEEE
14 years 10 months ago
Compressive image fusion
Compressive sensing (CS) has received a lot of interest due to its compression capability and lack of complexity on the sensor side. In this paper, we present a study of three sam...
Tao Wan, Cedric Nishan Canagarajah, Alin Achim
ACG
2009
Springer
14 years 3 months ago
Solving Kriegspiel Endings with Brute Force: The Case of KR vs. K
Retrograde analysis is a tool for reconstructing a game tree starting from its leaves; with these techniques one can solve specific subsets of a complex game, achieving optimal pl...
Paolo Ciancarini, Gian Piero Favini