Sciweavers

1585 search results - page 11 / 317
» Automatically optimizing secure computation
Sort
View
DATE
2002
IEEE
77views Hardware» more  DATE 2002»
14 years 21 days ago
An Optimal Algorithm for the Automatic Generation of March Tests
This paper presents an innovative algorithm for the automatic generation of March Tests. The proposed approach is able to generate an optimal March Test for an unconstrained set o...
Alfredo Benso, Stefano Di Carlo, Giorgio Di Natale...
VMCAI
2010
Springer
14 years 5 months ago
Automatic Abstraction for Congruences
c Abstraction for Congruences A Story of Beauty and the Beast Andy King and Harald S?ndergaard Portcullis Computer Security University of Melbourne g and Harald S?ndergaard Automat...
Andy King, Harald Søndergaard
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
14 years 8 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
SAMOS
2010
Springer
13 years 6 months ago
Accelerating high-level engineering computations by automatic compilation of Geometric Algebra to hardware accelerators
Abstract—Geometric Algebra (GA), a generalization of quaternions, is a very powerful form for intuitively expressing and manipulating complex geometric relationships common to en...
Jens Huthmann, Peter Muller, Florian Stock, Dietma...
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
14 years 2 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov