Sciweavers

1585 search results - page 6 / 317
» Automatically optimizing secure computation
Sort
View
CCS
2009
ACM
14 years 2 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
SPEECH
2010
125views more  SPEECH 2010»
13 years 2 months ago
Automatic intonation assessment for computer aided language learning
In this paper the nature and relevance of the information provided by intonation is discussed in the framework of second language learning. As a consequence, an automatic intonati...
Juan Pablo Arias, Néstor Becerra Yoma, Hira...
EUROCRYPT
2004
Springer
14 years 1 months ago
Multi-party Computation with Hybrid Security
It is well-known that n players connected only by pairwise secure channels can achieve multi-party computation secure against an active adversary if and only if – t < n/2 of t...
Matthias Fitzi, Thomas Holenstein, Jürg Wulls...
HPDC
2002
IEEE
14 years 21 days ago
A Comparison of TCP Automatic Tuning Techniques for Distributed Computing
Rather than painful, manual, static, per-connection optimization of TCP buffer sizes simply to achieve acceptable performance for distributed applications [8, 10], many researcher...
Eric Weigle, Wu-chun Feng