Sciweavers

700 search results - page 88 / 140
» et 2008
Sort
View
CIMAGING
2008
172views Hardware» more  CIMAGING 2008»
13 years 9 months ago
Blind reconstruction of sparse images with unknown point spread function
We consider the image reconstruction problem when the original image is assumed to be sparse and when partial knowledge of the point spread function (PSF) is available. In particu...
Kyle Herrity, Raviv Raich, Alfred O. Hero III
ICALP
2010
Springer
13 years 9 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
ESA
2010
Springer
207views Algorithms» more  ESA 2010»
13 years 8 months ago
Budgeted Red-Blue Median and Its Generalizations
In a Content Distribution Network application, we have a set of servers and a set of clients to be connected to the servers. Often there are a few server types and a hard budget co...
MohammadTaghi Hajiaghayi, Rohit Khandekar, Guy Kor...
COLING
2010
13 years 2 months ago
Automatic Extraction of Cue Phrases for Cross-Corpus Dialogue Act Classification
In this paper, we present an investigation into the use of cue phrases as a basis for dialogue act classification. We define what we mean by cue phrases, and describe how we extra...
Nick Webb, Michael Ferguson