Sciweavers

459 search results - page 44 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Ronald Cramer, Ivan Damgård, Ueli M. Maurer
ATAL
2008
Springer
13 years 9 months ago
Decommitment in multi-resource negotiation
This paper presents the design and implementation of negotiation agents that negotiate with other entities for acquiring multiple resources. In our approach, agents utilize a time...
Bo An, Victor R. Lesser, Kwang Mong Sim
CHI
2008
ACM
14 years 8 months ago
Improving meeting capture by applying television production principles with audio and motion detection
Video recordings of meetings are often monotonous and tedious to watch. In this paper, we report on the design, implementation and evaluation of an automated meeting capture syste...
Abhishek Ranjan, Jeremy P. Birnholtz, Ravin Balakr...
INFOCOM
2007
IEEE
14 years 1 months ago
Toward Optimal Network Fault Correction via End-to-End Inference
— We consider an end-to-end approach of inferring network faults that manifest in multiple protocol layers, with an optimization goal of minimizing the expected cost of correctin...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
SPATIALCOGNITION
2000
Springer
13 years 11 months ago
Inference and Visualization of Spatial Relations
We present an approach to spatial inference which is based on the procedural semantics of spatial relations. In contrast to qualitative reasoning, we do not use discrete symbolic m...
Sylvia Wiebrock, Lars Wittenburg, Ute Schmid, Frit...