Sciweavers

1585 search results - page 15 / 317
» Automatically optimizing secure computation
Sort
View
CLOUD
2010
ACM
14 years 25 days ago
Towards automatic optimization of MapReduce programs
Timely and cost-effective processing of large datasets has become a critical ingredient for the success of many academic, government, and industrial organizations. The combination...
Shivnath Babu
MICCAI
2005
Springer
14 years 8 months ago
Optimal Trajectories Computation Within Regions of Interest for Hepatic RFA Planning
Abstract. Percutaneous radiofrequency ablation has become a frequently used technique for the treatment of liver cancers, but still remains very difficult to plan. In this paper, w...
Caroline Villard, Claire Baegert, Pascal Schreck, ...
IACR
2011
94views more  IACR 2011»
12 years 7 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
IJBC
2007
86views more  IJBC 2007»
13 years 7 months ago
Optimization and the Miranda Approach in Detecting Horseshoe-Type Chaos by Computer
f of the underlying abstract theorem avoids of referring to any results of applied algebraic topology and relies only on the Brouwer fixed point theorem. The second novelty is tha...
Balázs Bánhelyi, Tibor Csendes, Barn...
COMPSAC
2011
IEEE
12 years 7 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...