Sciweavers

882 search results - page 25 / 177
» Visibility-driven transfer functions
Sort
View
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
ACCV
2009
Springer
13 years 11 months ago
Efficient Human Action Detection Using a Transferable Distance Function
Abstract. In this paper, we address the problem of efficient human action detection with only one template. We choose the standard slidingwindow approach to scan the template video...
Weilong Yang, Yang Wang 0003, Greg Mori
ESANN
2001
13 years 9 months ago
Constructive density estimation network based on several different separable transfer functions
Networks estimating probability density are usually based on radial basis function of the same type. Feature Space Mapping constructive network based on separable functions, optimi...
Wlodzislaw Duch, Rafal Adamczak, Geerd H. F. Dierc...
BMCBI
2010
131views more  BMCBI 2010»
13 years 7 months ago
FACT: Functional annotation transfer between proteins with similar feature architectures
Background: The increasing number of sequenced genomes provides the basis for exploring the genetic and functional diversity within the tree of life. Only a tiny fraction of the e...
Tina Koestler, Arndt von Haeseler, Ingo Ebersberge...
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger