Sciweavers

970 search results - page 103 / 194
» case 2011
Sort
View
IACR
2011
125views more  IACR 2011»
12 years 9 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
MST
2011
200views Hardware» more  MST 2011»
13 years 5 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
ICASSP
2011
IEEE
13 years 1 months ago
A constrained optimization approach for multi-zone surround sound
A recent approach to surround sound is to perform exact control of the sound field over a region of space. Here, the driving signals for an array of loudspeakers are chosen to cr...
Terence Betlehem, Paul D. Teal
CIE
2011
Springer
12 years 10 months ago
Automatic Learners with Feedback Queries
Automatic classes are classes of languages for which a finite automaton can decide whether a given element is in a set given by its index. The present work studies the learnabilit...
John Case, Sanjay Jain, Yuh Shin Ong, Pavel Semukh...
ACIIDS
2011
IEEE
209views Database» more  ACIIDS 2011»
13 years 5 months ago
Prototype of Object-Oriented Declarative Workflows
While in the traditional workflow processes the control flow is determined statically within process definitions, in declarative workflow processes the control flow is dynamic and ...
Marcin Dabrowski, Michal Drabik, Mariusz Trzaska, ...