Sciweavers

10182 search results - page 1921 / 2037
» Case Studies
Sort
View
EUROCRYPT
2003
Springer
15 years 10 months ago
On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions
The recently proposed universally composable (UC) security framework for analyzing security of cryptographic protocols provides very strong security guarantees. In particular, a p...
Ran Canetti, Eyal Kushilevitz, Yehuda Lindell
BMCBI
2008
120views more  BMCBI 2008»
15 years 4 months ago
Statistical issues in the analysis of Illumina data
Background: Illumina bead-based arrays are becoming increasingly popular due to their high degree of replication and reported high data quality. However, little attention has been...
Mark J. Dunning, Nuno L. Barbosa-Morais, Andy G. L...
CORR
2010
Springer
162views Education» more  CORR 2010»
15 years 4 months ago
Random sampling of lattice paths with constraints, via transportation
We investigate Monte Carlo Markov Chain (MCMC) procedures for the random sampling of some one-dimensional lattice paths with constraints, for various constraints. We will see that...
Lucas Gerin
DCG
2010
289views more  DCG 2010»
15 years 4 months ago
Algorithms for Approximate Shortest Path Queries on Weighted Polyhedral Surfaces
We consider the well known geometric problem of determining shortest paths between pairs of points on a polyhedral surface P, where P consists of triangular faces with positive we...
Lyudmil Aleksandrov, Hristo Djidjev, Hua Guo, Anil...
PPOPP
2009
ACM
16 years 5 months ago
Transactional memory with strong atomicity using off-the-shelf memory protection hardware
This paper introduces a new way to provide strong atomicity in an implementation of transactional memory. Strong atomicity lets us offer clear semantics to programs, even if they ...
Martín Abadi, Tim Harris, Mojtaba Mehrara
« Prev « First page 1921 / 2037 Last » Next »