Sciweavers

3096 search results - page 514 / 620
» Theory and Use of the EM Algorithm
Sort
View
ASIACRYPT
2004
Springer
14 years 2 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
CPM
2004
Springer
84views Combinatorics» more  CPM 2004»
14 years 2 months ago
Small Phylogeny Problem: Character Evolution Trees
Abstract. Phylogenetics is a science of determining connections between groups of organisms in terms of ancestor/descendent relationships, usually expressed by phylogenetic trees, ...
Arvind Gupta, Ján Manuch, Ladislav Stacho, ...
ESORICS
2004
Springer
14 years 2 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
ISER
2004
Springer
115views Robotics» more  ISER 2004»
14 years 2 months ago
Dynamic Virtual Fences for Controlling Cows
A virtual fence is created by applying an aversive stimulus to an animal when it approaches a predefined boundary. It is implemented by a small animal-borne computer system with a...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
14 years 2 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu