Sciweavers

10891 search results - page 81 / 2179
» Combining Model Reductions
Sort
View
135
Voted
EUROCRYPT
2007
Springer
15 years 6 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
102
Voted
SDM
2004
SIAM
162views Data Mining» more  SDM 2004»
15 years 4 months ago
Subspace Clustering of High Dimensional Data
Clustering suffers from the curse of dimensionality, and similarity functions that use all input features with equal relevance may not be effective. We introduce an algorithm that...
Carlotta Domeniconi, Dimitris Papadopoulos, Dimitr...
91
Voted
PATMOS
2004
Springer
15 years 8 months ago
Leakage Reduction at the Architectural Level and Its Application to 16 Bit Multiplier Architectures
Christian Schuster, Jean-Luc Nagel, Christian Pigu...
114
Voted
ISSTA
2006
ACM
15 years 8 months ago
Application of automated environment generation to commercial software
Model checking can be an effective technique for detecting concurrency-related errors in software systems. However, due to scalability issues, to handle industrial-strength softw...
Oksana Tkachuk, Sreeranga P. Rajan