Learn More
We consider perfect verifiable secret sharing (VSS) in a synchronous network of n processors (players) where a designated player called the dealer wishes to distribute a secret s among the players in a way that no t of them obtain any information, but any t + 1 players obtain full information about the secret. The round complexity of a VSS protocol is(More)
We study the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of generalized Byzantine adversaries. It is known that in the threshold adversary model, where the Byzantine adversary can corrupt upto any <i>t</i> among the <i>n</i> players (nodes), perfectly secure communication among any pair of(More)
The Maximum-Flow problem is a classical problem in com-binatorial optimization and has many practical applications. We introduce a new variant of this well known Maximum-Flow problem, viz., the Maximum-Equal-Flow problem,wherein, for each vertex (other than the source) in the network, the actual flows along the arcs emanating from that vertex are(More)
We consider AESOP Task as Topic based evaluation of information content. Means at first stage, we identify the topics covered in given model/reference summary and calculate their importance. At the next stage, we calculate the information coverage in test / machine generated summary, w.r.t. every identified topic. We use the local importance of words in(More)
The significant growth in computational power of modern Graphics Processing Units(GPUs) coupled with the advent of general purpose programming environments like NVIDA's CUDA, has seen GPUs emerging as a very popular parallel computing platform. However, despite their popularity, there is no performance model of any GPGPU programming environment. The absence(More)
In this paper we present an automatic Keyphrase extraction technique for English documents of scientific domain. The devised algorithm uses n-gram filtration technique, which filters sophisticated n-grams {1d<i>n</i>d4} along with their weight from the words of input document. To develop n-gram filtration technique, we have used (1) LZ78 data compression(More)
For content level access, very often database needs the query as a sample image. However, the image may contain private information and hence the user does not wish to reveal the image to the database. Private Content Based Image Retrieval (PCBIR) deals with retrieving similar images from an image database without revealing the content of the query image –(More)