Sciweavers

524 search results - page 38 / 105
» ets 2010
Sort
View
IJISEC
2010
114views more  IJISEC 2010»
13 years 5 months ago
A new hardware-assisted PIR with O(n) shuffle cost
Abstract Since the concept of private information retrieval (PIR) was first formalized by Chor et. al, various constructions have been proposed with a common goal of reducing commu...
Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong...
ECCC
2010
147views more  ECCC 2010»
13 years 2 months ago
A Note on Amplifying the Error-Tolerance of Locally Decodable Codes
Trevisan [Tre03] suggested a transformation that allows amplifying the error rate a code can handle. We observe that this transformation, that was suggested in the non-local setti...
Avraham Ben-Aroya, Klim Efremenko, Amnon Ta-Shma
IJNSEC
2010
98views more  IJNSEC 2010»
13 years 2 months ago
An MSS Based on the Elliptic Curve Cryptosystem
In 2004, a multi-signature scheme (MSS) based on the elliptic curve cryptosystem is given by Chen et al. [1]. Later, Liu and Liu [6] showed that if one of the users always sends h...
Hemlal Sahu, Birendra Kumar Sharma
INTERSPEECH
2010
13 years 2 months ago
Revisiting VTLN using linear transformation on conventional MFCC
In this paper, we revisit the linear transformation for VTLN on conventional MFCC proposed by Sanand et al. in [1], using the idea of band-limited interpolation. The filter-bank i...
Doddipatla Rama Sanand, Ralf Schlüter, Herman...
JMLR
2010
114views more  JMLR 2010»
13 years 2 months ago
On the relation between universality, characteristic kernels and RKHS embedding of measures
Universal kernels have been shown to play an important role in the achievability of the Bayes risk by many kernel-based algorithms that include binary classification, regression, ...
Bharath K. Sriperumbudur, Kenji Fukumizu, Gert R. ...