Sciweavers

193 search results - page 28 / 39
» Short Bases of Lattices over Number Fields
Sort
View
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
14 years 1 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz
INFOCOM
2000
IEEE
14 years 24 days ago
Fast and Scalable Priority Queue Architecture for High-Speed Network Switches
-In this paper, we present a fast and scalable pipelined priority queue architecture for use in high-performance switches with support for fine-grained quality of service (QoS) gu...
Ranjita Bhagwan, Bill Lin
TIT
2008
129views more  TIT 2008»
13 years 8 months ago
Cooperative Fading Regions for Decode and Forward Relaying
Abstract--Cooperative transmission protocols over fading channels are based on a number of relaying nodes to form virtual multiantenna transmissions. Diversity provided by these te...
Stefano Savazzi, Umberto Spagnolini
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 9 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
CSL
2010
Springer
13 years 8 months ago
Active learning and semi-supervised learning for speech recognition: A unified framework using the global entropy reduction maxi
We propose a unified global entropy reduction maximization (GERM) framework for active learning and semi-supervised learning for speech recognition. Active learning aims to select...
Dong Yu, Balakrishnan Varadarajan, Li Deng, Alex A...