Sciweavers

4007 search results - page 188 / 802
» Computation with imprecise probabilities
Sort
View
137
Voted
ICCCN
2008
IEEE
15 years 10 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
153
Voted
PDCAT
2007
Springer
15 years 10 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
151
Voted
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 4 months ago
On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
In this paper, we give a theoretical analysis for the algorithms to compute functional decomposition for multivariate polynomials based on differentiation and homogenization which ...
Shang-Wei Zhao, Ruyong Feng, Xiao-Shan Gao
CORR
1998
Springer
106views Education» more  CORR 1998»
15 years 3 months ago
Lower Bounds for Quantum Search and Derandomization
We prove lower bounds on the error probability of a quantum algorithm for searching through an unordered list of N items, as a function of the number T of queries it makes. In par...
Harry Buhrman, Ronald de Wolf
112
Voted
CONCUR
2008
Springer
15 years 5 months ago
Termination Problems in Chemical Kinetics
We consider nondeterministic and probabilistic termination problems in a process algebra that is equivalent to basic chemistry. We show that the existence of a terminating computat...
Gianluigi Zavattaro, Luca Cardelli