-
6
-
-
0032201716
-
An Optimal Algorithm for Approximate Neaest Neighbor Searching in Fixed Dimensions
-
Sunil Arya, David Mount, Nathan Netanyahu, Ruth Silverman, and Angela Wu. An Optimal Algorithm for Approximate Neaest Neighbor Searching in Fixed Dimensions. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, 1994.
-
Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, 1994
-
-
Arya, S.1
Mount, D.2
Netanyahu, N.3
Silverman, R.4
Wu, A.5
-
7
-
-
0032201716
-
An Optimal Algorithm for Approximate Nearest Neighbor Searching Fixed Dimensions
-
Sunil Arya, David M. Mount, Nathan S. Netanyahu, Ruth Silverman, and Angela Y. Wu. An Optimal Algorithm for Approximate Nearest Neighbor Searching Fixed Dimensions. Journal of the ACM, 45(6):891-923, 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 891-923
-
-
Arya, S.1
Mount, D.M.2
Netanyahu, N.S.3
Silverman, R.4
Wu, A.Y.5
-
21
-
-
77951707963
-
Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data
-
Levent Ertöchael Steinbach, and Vipin Kumar. Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data. In Proceedings of the SIAM International Conference on Data Mining, 2003.
-
Proceedings of the SIAM International Conference on Data Mining, 2003
-
-
Steinbach, L.E.1
Kumar, V.2
-
22
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
S. Even, O. Goldreich, and A. Lempel. A Randomized Protocol for Signing Contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
30
-
-
0015680655
-
Clustering Using a Similarity Measure Based on Shared Nearest Neighbors
-
R. A. Jarvis and E. A. Patrick. Clustering Using a Similarity Measure Based on Shared Nearest Neighbors. IEEE Transactions on Computers, C22(11):1025-1034, 1973.
-
(1973)
IEEE Transactions on Computers
, vol.C22
, Issue.11
, pp. 1025-1034
-
-
Jarvis, R.A.1
Patrick, E.A.2
-
31
-
-
84892344961
-
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation
-
Eike Kiltz, Ivan Damgaard, Matthias Fitzi, Jesper Buus Nielsen, and Tomas Toft. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. In Proceedings of the third Theory of Cryptography Conference, 2006.
-
Proceedings of the Third Theory of Cryptography Conference, 2006
-
-
Kiltz, E.1
Damgaard, I.2
Fitzi, M.3
Nielsen, J.B.4
Toft, T.5
-
39
-
-
34548073186
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Pascal Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Proceedings of Eurocrypt, 1999.
-
Proceedings of Eurocrypt, 1999
-
-
Paillier, P.1
-
42
-
-
0018545449
-
How to Share a Secret
-
Adi Shamir. How to Share a Secret. Communications of the ACM, 22(11):512-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 512-613
-
-
Shamir, A.1
-
44
-
-
1342345050
-
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
-
Wen-Guey Tzeng. Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters. IEEE Transactions on Computers, 53(2):232-240, 2004.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.2
, pp. 232-240
-
-
Tzeng, W.-G.1
-
48
-
-
33646358700
-
Experimental Analysis of a Privacy-Preserving Scalar Product Protocol
-
Zhiqiang Yang, Rebecca Wright, and Hiranmayee Subramaniam. Experimental Analysis of a Privacy-Preserving Scalar Product Protocol. International Journal of Computer Systems Science and Engineering, 21(1):47-52, 2006.
-
(2006)
International Journal of Computer Systems Science and Engineering
, vol.21
, Issue.1
, pp. 47-52
-
-
Yang, Z.1
Wright, R.2
Subramaniam, H.3
|