Sciweavers

1806 search results - page 13 / 362
» Some Functions Computable with a Fused-Mac
Sort
View
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
13 years 7 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
EUROCRYPT
2006
Springer
14 years 1 months ago
The Function Field Sieve in the Medium Prime Case
In this paper, we study the application of the function field sieve algorithm for computing discrete logarithms over finite fields of the form Fqn when q is a medium-sized prime po...
Antoine Joux, Reynald Lercier
EMMCVPR
1999
Springer
14 years 2 months ago
Deformation Energy for Size Functions
Size functions are functions from the real plane to thenatural numbers useful for describing shapes of objects. They allow to translate the problem of comparing shapes to the probl...
Pietro Donatini, Patrizio Frosini, Claudia Landi
CIT
2007
Springer
14 years 4 months ago
Performance Assessment of Some Clustering Algorithms Based on a Fuzzy Granulation-Degranulation Criterion
In this paper a fuzzy quantization dequantization criterion is used to propose an evaluation technique to determine the appropriate clustering algorithm suitable for a particular ...
Sriparna Saha, Sanghamitra Bandyopadhyay
ACL2
2006
ACM
14 years 1 months ago
Quantification in tail-recursive function definitions
We investigate the logical issues behind axiomatizing equations that contain both recursive calls and quantifiers in ACL2. We identify a class of such equations, named extended ta...
Sandip Ray