Sciweavers

3134 search results - page 86 / 627
» Computing full disjunctions
Sort
View
EUROCRYPT
2007
Springer
15 years 6 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
118
Voted
AAAI
2006
15 years 3 months ago
Computing Slater Rankings Using Similarities among Candidates
Voting (or rank aggregation) is a general method for aggregating the preferences of multiple agents. One important voting rule is the Slater rule. It selects a ranking of the alte...
Vincent Conitzer
COMPUTER
2004
105views more  COMPUTER 2004»
15 years 2 months ago
SoftUDC: A Software-Based Data Center for Utility Computing
, abstracts each virtual machine's view of its storage and networks, and binds virtual machines across nodes into isolated virtual farms. The SoftUDC control system spans all ...
Mahesh Kallahalla, Mustafa Uysal, Ram Swaminathan,...
110
Voted
LOGCOM
2000
63views more  LOGCOM 2000»
15 years 2 months ago
Reflection principles in computational logic
We introduce the concept of reflection principle as a knowledge representation paradigm in a computational logic setting. Reflection principles are expressed as certain kinds of l...
Jonas Barklund, Pierangelo Dell'Acqua, Stefania Co...
100
Voted
SIGCSE
2009
ACM
135views Education» more  SIGCSE 2009»
16 years 2 months ago
Methodology for successful undergraduate recruiting in computer science at comprehensive public universities
This paper presents a methodology for increasing undergraduate Computer Science (CS) major enrollment at comprehensive public universities, particularly those that have first gene...
Patricia Morreale, Stan Kurkovsky, George Chang