Sciweavers

9 search results - page 2 / 2
» A New Type of Size Function Respecting Premeshed Entities
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 7 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
HICSS
2003
IEEE
146views Biometrics» more  HICSS 2003»
14 years 21 days ago
A Model for the Emergence and Diffusion of Software Standards
The economic impact of the growth dynamic of standards is often described from a macroeconomic point of view, employing network effect theory and models dealing with externalities...
Tim Stockheim, Michael Schwind, Wolfgang Köni...
FOCS
2006
IEEE
14 years 1 months ago
On the Compressibility of NP Instances and Cryptographic Applications
We study compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problem...
Danny Harnik, Moni Naor
GECCO
2004
Springer
155views Optimization» more  GECCO 2004»
14 years 24 days ago
Genetic Network Programming with Reinforcement Learning and Its Performance Evaluation
A new graph-based evolutionary algorithm named “Genetic Network Programming, GNP” has been proposed. GNP represents its solutions as directed graph structures, which can improv...
Shingo Mabu, Kotaro Hirasawa, Jinglu Hu