Sciweavers

135 search results - page 14 / 27
» Secure Computation of the Mean and Related Statistics
Sort
View
EUROCRYPT
2008
Springer
13 years 10 months ago
Obfuscating Point Functions with Multibit Output
We study obfuscation of point functions with multibit output and other related functions. A point function with multibit output returns a string on a single input point and zero ev...
Ran Canetti, Ronny Ramzi Dakdouk
AGENTS
1997
Springer
14 years 23 days ago
Challenger: A Multi-agent System for Distributed Resource Allocation
In this paper we introduce Challenger, a multiagent system that performs completely distributed resource allocation. Challenger consists of agents which individually manage local ...
Anthony Chavez, Alexandros Moukas, Pattie Maes
ASIACRYPT
2000
Springer
14 years 28 days ago
Zero-Knowledge and Code Obfuscation
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not ...
Satoshi Hada
NOLISP
2007
Springer
14 years 2 months ago
Objective and Subjective Evaluation of an Expressive Speech Corpus
This paper presents the validation of the expressive content of an acted corpus produced for its use in speech synthesis. Firstly, objective techniques have been carried out by me...
Ignasi Iriondo Sanz, Santiago Planet, Joan Claudi ...
SODA
2008
ACM
184views Algorithms» more  SODA 2008»
13 years 10 months ago
Coresets, sparse greedy approximation, and the Frank-Wolfe algorithm
The problem of maximizing a concave function f(x) in a simplex S can be solved approximately by a simple greedy algorithm. For given k, the algorithm can find a point x(k) on a k-...
Kenneth L. Clarkson