Sciweavers

172 search results - page 26 / 35
» Separation of Nonconvex Sets with General Augmenting Functio...
Sort
View
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
14 years 8 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...
FIW
2009
101views Communications» more  FIW 2009»
13 years 5 months ago
Feature Interaction Detection in the Feature Language Extensions
One of the most difficult tasks in software development is that features are implemented by changing the code of other features. This problem cannot be solved with existing general...
Lei Sun, Lu Zhoa, Yimeng Li, Wu-Hon F. Leung
ICA
2004
Springer
14 years 28 days ago
On the FIR Inversion of an Acoustical Convolutive Mixing System: Properties and Limitations
In this paper we address the problem of Least-Squares (LS) optimal FIR inverse-filtering of an convolutive mixing system, given by a set of acoustic impulse responses (AIRs). The ...
Markus Hofbauer
PODS
2010
ACM
249views Database» more  PODS 2010»
14 years 18 days ago
Semantic query optimization in the presence of types
Both semantic and type-based query optimization rely on the idea that queries often exhibit non-trivial rewritings if the state space of the database is restricted. Despite their ...
Michael Meier 0002, Michael Schmidt, Fang Wei, Geo...
ASIACRYPT
2008
Springer
13 years 9 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas