Sciweavers

882 search results - page 52 / 177
» Visibility-driven transfer functions
Sort
View
ASIACRYPT
2005
Springer
14 years 1 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov
PARA
2004
Springer
14 years 1 months ago
Structure-Preserving Model Reduction
A general framework for structure-preserving model reduction by Krylov subspace projection methods is developed. The goal is to preserve any substructures of importance in the matr...
Ren-Cang Li, Zhaojun Bai
IJCNN
2000
IEEE
14 years 5 days ago
Knowledge-Based Cascade-Correlation
KBCC is an extension of the cascade-correlation algorithm that treats functions encapsulating prior knowledge as black-boxes which, like simple sigmoidal neurons, can be recruited...
Thomas R. Shultz, François Rivest
GLOBECOM
2010
IEEE
13 years 5 months ago
Information Theoretic Optimal Broadband Matching for Communication Systems
We present an information theoretic perspective on optimal broadband matching. Most of the broadband matching and communication theory literature assumes a frequencyflat reflection...
Pawandeep S. Taluja, Brian L. Hughes
SENSYS
2010
ACM
13 years 5 months ago
Hijacking power and bandwidth from the mobile phone's audio interface
We endow the digital mobile phone with an analog interface that can parasitically power external peripherals and transfer data to and from them using the existing headset interfac...
Ye-Sheng Kuo, Thomas Schmid, Prabal Dutta