66 Hits in 2.6 sec

Share Conversion and Private Information Retrieval

Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Ilan Orlov
2012 2012 IEEE 27th Conference on Computational Complexity  
An information-theoretic private information retrieval (PIR) protocol allows a client to retrieve the i-th bit of a database, held by two or more servers, without revealing information about i to any individual  ...  In a nutshell, we use the following two-step approach: (1) apply share conversion to get a low-communication secure multiparty computation protocol P for a nontrivial class F of low-depth circuits; (2)  ...  ACKNOWLEDGMENT We thank Gadi Aleksandrowicz for helpful discussions and comments.  ... 
doi:10.1109/ccc.2012.23 dblp:conf/coco/BeimelIKO12 fatcat:f6plnguxszdszpabtydwerdmnu

Secure Evaluation Protocol for Personalized Medicine

Mentari Djatmiko, Arik Friedman, Roksana Boreli, Felix Lawrence, Brian Thorne, Stephen Hardy
2014 Proceedings of the 13th Workshop on Privacy in the Electronic Society - WPES '14  
Our proposal relies on a combination of partially homomorphic Paillier encryption and private information retrieval.  ...  In this paper, we propose a secure evaluation algorithm to compute genomic tests that are based on a linear combination of genome data values (we use the Warfarin dosing algorithm as a representative example  ...  Our proposal relies on a combination of partially homomorphic encryption (Paillier encryption [30] ) and private information retrieval (PIR) [11] .  ... 
doi:10.1145/2665943.2665967 dblp:conf/wpes/DjatmikoFBLTH14 fatcat:pfcjfeol6bearbnovpduf7wvse

Small, stupid, and scalable

Alexander Iliev, Sean W. Smith
2010 Proceedings of the fifth ACM workshop on Scalable trusted computing - STC '10  
We then use our own prior work on using trusted third parties for practical Private Information Retrieval to design and prototype tiny trusted third parties (TTTPs) that substantially reduce the overhead  ...  One way is for Agnes to house C in a strong tamper-protected secure coprocessor at Boris's site.  ...  Theoretical computer scientists developed many algorithms (e.g., [11, 10] ) through which users, servers, and sometimes other parties could carry out computation and achieve PIR.  ... 
doi:10.1145/1867635.1867643 fatcat:xt46k4dcuvfdvldnr67mldhciy

On Search Engine Evaluation Metrics [article]

Pavel Sirotkin
2013 arXiv   pre-print
The first part of this thesis provides an overview of previous literature on the evaluation of search engine evaluation metrics themselves, as well as critiques of and comments on individual studies and  ...  Instead, evaluation methods should themselves be rigorously evaluated with regard to goals set for a particular study.  ...  He gave me the possibility to write a part of this thesis as part of my research at the Department of Information Science at Düsseldorf University; and it was also him who arranged for undergraduate students  ... 
arXiv:1302.2318v1 fatcat:wye4hfhvxjh27adetcccnyynyu

Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing [chapter]

Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu
2011 Lecture Notes in Computer Science  
In this paper, we address the specification and enforcement of querier privacy constraints on the execution of distributed database queries.  ...  However, in a decentralized setting, two query plans that produce the same result might actually reveal vastly different information about the intensional description of a user's query to the servers participating  ...  This approach has come to be known as information-theoretic PIR. PIR using only a single server was established using computational techniques in [14] .  ... 
doi:10.1007/978-3-642-23822-2_34 fatcat:hd3jh5vhzvetvp4pk7und5lgj4

OpenStructure: an integrated software framework for computational structural biology

M. Biasini, T. Schmidt, S. Bienert, V. Mariani, G. Studer, J. Haas, N. Johner, A. D. Schenk, A. Philippsen, T. Schwede
2013 Acta Crystallographica Section D: Biological Crystallography  
Openstructure: an integrated software framework for computational structural biology. Acta Crystallographica Section D: Biological Crystallography 69(Pt 5): 701-709.  ...  Published Version Research projects in structural biology increasingly rely on combinations of heterogeneous sources of information, e.g. evolutionary information from multiple sequence alignments, experimental  ...  Synergy between these fields has led to methods which, for example, combine electron-density information with evolutionary information from sequence alignments and structural information from computational  ... 
doi:10.1107/s0907444913007051 pmid:23633579 pmcid:PMC3640466 fatcat:szph2eqkd5crnpdabhxchpwa2q

Hidden credential retrieval from a reusable password

Xavier Boyen
2009 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09  
Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion  ...  Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password  ...  Acknowledgments The author would like to thank the anonymous referees of ASIACCS 2009 for valuable comments.  ... 
doi:10.1145/1533057.1533089 dblp:conf/ccs/Boyen09 fatcat:kuke57bvmfas5dllbizrjw2gqq

3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval [chapter]

Stanislaw Jarecki, Boyang Wei
2018 Lecture Notes in Computer Science  
MPC ORAM enables secure computation of any RAM program on large data held by different entities, e.g. MPC processing of database queries on a secret-shared database.  ...  The shortened version of this paper appears in ACNS'18 proceedings [21] functionality as search and information retrieval.  ...  Because most of our protocols employ information-theoretic tools, for most protocols we do not explicitly show simulator algorithms, but instead we argue that the messages received by each party in the  ... 
doi:10.1007/978-3-319-93387-0_19 fatcat:siegnajrnradvkdalrpqoqn5py

Uncheatable Distributed Computations [chapter]

Philippe Golle, Ilya Mironov
2001 Lecture Notes in Computer Science  
The growth of the Internet has made it possible to invite the participation of just about any computer in such distributed computations.  ...  In a commercial setting where participants get paid for their contribution, there is incentive for dishonest participants to claim credit for work they did not do.  ...  Acknowledgments The authors are grateful to Dan Boneh for helpful discussions on the subject of this paper.  ... 
doi:10.1007/3-540-45353-9_31 fatcat:m3ydg7qonvchdp5rgs45rv3zny

Topological organization of connectivity strength in the rat connectome

Martijn P. van den Heuvel, Lianne H. Scholtens, Marcel A. de Reus
2015 Brain Structure and Function  
Here we analyzed the macroscale connectome of the rat brain, including detailed information on the macroscale interregional pathways between 67 cortical and subcortical regions as provided by the high-quality  ...  Animal studies allow for an invasive measurement of the connections of these networks at the macroscale level by means of neuronal tracing of axonal projections, providing a unique opportunity for the  ...  Acknowledgments We thank Peter Burbach for inspiring discussions and helpful suggestions.  ... 
doi:10.1007/s00429-015-0999-6 pmid:25697666 pmcid:PMC4819781 fatcat:3wqpsu27efglvofvs5sx5jzytq

Design, Implementation and Practical Evaluation of an IoT Home Automation System for Fog Computing Applications Based on MQTT and ZigBee-WiFi Sensor Nodes

Iván Froiz-Míguez, Tiago Fernández-Caramés, Paula Fraga-Lamas, Luis Castedo
2018 Sensors  
One such enabling technologies is fog computing, which extends cloud computing to the edge of a network allowing for developing novel Internet of Things (IoT) applications and services.  ...  This article presents ZiWi, a distributed fog computing Home Automation System (HAS) that allows for carrying out seamless communications among ZigBee and WiFi devices.  ...  ] Read sensor value 0.5 s [25] Act on actuator 0.5 s [41] Detect and react to a shortcut 1233.19 µs [43] Collect sensor values and react depending on them 32.9 ms Table 9 . 9 ZigBee  ... 
doi:10.3390/s18082660 pmid:30104529 fatcat:nwmlovhjfrct5d2hoen42p3kde

Risk-return relationship: An empirical study of different statistical methods for estimating the Capital Asset Pricing Models (CAPM) and the Fama-French model for large cap stocks [article]

Linh Nghiem
2015 arXiv   pre-print
While improving the performance of the model, many studies, on one hand, have attempted to apply different statistical methods to estimate the model, on the other hand, have added more predictors to the  ...  The Capital Asset Pricing Model (CAPM) is one of the original models in explaining risk-return relationship in the financial market.  ...  Instead, while theoretical Bayesian approach fixes the prior based on some belief or information in the past, empirical Bayesian approach estimates the prior from the past data.  ... 
arXiv:1511.07101v1 fatcat:vcmhiywhqbhglojm25gmgnivy4

Prediction of regional functional impairment following experimental stroke via connectome analysis

O. Schmitt, S. Badurek, W. Liu, Y. Wang, G. Rabiller, A. Kanoke, P. Eipert, J. Liu
2017 Scientific Reports  
It is well known that the interplay of several brain regions is crucial for learning and memory.  ...  We sought to investigate how cortical stroke disrupts multiple brain regions in processing spatial information.  ...  To the best of our knowledge, this is the first study set to understand how stroke affects functional activation based on structural connectivity information using a connectome platform.  ... 
doi:10.1038/srep46316 pmid:28406178 pmcid:PMC5390322 fatcat:6fv47afq25awbktyyl6jhduz6q

Dematipyriforma aquilaria gen. et sp. nov., a New Hyphomycetous Taxon from Aquilaria crassna

Li-Yan Sun, Hai-Yan Li, Xiang Sun, Liang-Dong Guo
2017 Cryptogamie Mycologie  
For example, if Ctrl+Y was set to be a shortcut for "copy", when working in the text editor, Ctrl+C would still be the copy shortcut To set shortcuts, choose View->Customize Menu Shortcuts.  ...  Also, current menu shortcuts may be used (defaults: Ctrl+F8 for copy and Ctrl+F9 for paste). Editing on screen Sequences may be edited on screen much like working in a word-processor.  ...  Setting Mutual Information Preferences The mutual information preferences dialog may be brought up by choosing "Preferences" from the "Options" menu and clicking the "mutual information" tab.  ... 
doi:10.7872/crym/v38.iss3.2017.341 fatcat:d5cdiidt4jeovoh22pen3hq3hq

Bayesian Workflow [article]

Andrew Gelman, Aki Vehtari, Daniel Simpson, Charles C. Margossian, Bob Carpenter, Yuling Yao, Lauren Kennedy, Jonah Gabry, Paul-Christian Bürkner, Martin Modrák
2020 arXiv   pre-print
be relevant for our conclusions.  ...  Beyond inference, the workflow also includes iterative model building, model checking, validation and troubleshooting of computational problems, model understanding, and model comparison.  ...  Shortcuts are important for humans as well as computers, and shortcuts help explain why the typical workflow is iterative (see more in Section 12.2).  ... 
arXiv:2011.01808v1 fatcat:nxsczpgfljhijkgwkp6fecnpty
« Previous Showing results 1 — 15 out of 66 results