Sciweavers

11051 search results - page 2114 / 2211
» An Investigation of Generalized Cases
Sort
View
EUROCRYPT
1999
Springer
14 years 2 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
HICSS
1998
IEEE
111views Biometrics» more  HICSS 1998»
14 years 2 months ago
Measuring Disagreement in Groups Facing Limited Choice Problems
Agreement is an important concept in group interaction, both for computermediated and face-to-face groups. This paper presents a measure of disagreement, D, for groups facing limi...
Brian Whitworth, Roy Felton
KIVS
1999
Springer
14 years 2 months ago
Mobile Agents as an Architectural Concept for Internet-Based Distributed Applications - The WASP Project Approach
Abstract. After introducing the concept of mobile agents and potential application domains, we motivate why mobile agent technology is an interesting concept for large Internet-bas...
Stefan Fünfrocken, Friedemann Mattern
STACS
1999
Springer
14 years 2 months ago
Lower Bounds for Dynamic Algebraic Problems
Abstract. We consider dynamic evaluation of algebraic functions (matrix multiplication, determinant, convolution, Fourier transform, etc.) in the model of Reif and Tate; i.e., if f...
Gudmund Skovbjerg Frandsen, Johan P. Hansen, Peter...
CAV
1998
Springer
175views Hardware» more  CAV 1998»
14 years 2 months ago
An ACL2 Proof of Write Invalidate Cache Coherence
As a pedagogical exercise in ACL2, we formalize and prove the correctness of a write invalidate cache scheme. In our formalization, an arbitrary number of processors, each with its...
J. Strother Moore
« Prev « First page 2114 / 2211 Last » Next »