Sciweavers

1147 search results - page 92 / 230
» Transformation of Access Rights
Sort
View
NN
2008
Springer
143views Neural Networks» more  NN 2008»
13 years 7 months ago
A new nonlinear similarity measure for multichannel signals
We propose a novel similarity measure, called the correntropy coefficient, sensitive to higher order moments of the signal statistics based on a similarity function called the cro...
Jian-Wu Xu, Hovagim Bakardjian, Andrzej Cichocki, ...
DRM
2007
Springer
14 years 3 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
CAD
2006
Springer
13 years 8 months ago
On visual similarity based 2D drawing retrieval
A large amount of 2D drawings have been produced in engineering fields. To reuse and share the available drawings efficiently, we propose two methods in this paper, namely 2.5D sp...
Jiantao Pu, Karthik Ramani
TCC
2009
Springer
160views Cryptology» more  TCC 2009»
14 years 9 months ago
Simple, Black-Box Constructions of Adaptively Secure Protocols
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious ad...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
PIMRC
2008
IEEE
14 years 3 months ago
Blind channel estimation based on Second Order Statistics for IFDMA
—In this paper, the Interleaved Frequency Division Multiple Access (IFDMA) scheme is considered as a special case of Discrete Fourier Transform (DFT)-precoded Orthogonal Frequenc...
Anja Sohl, Anja Klein