Sciweavers

2253 search results - page 86 / 451
» Computing with Realizational Morphology
Sort
View
CTRSA
2006
Springer
107views Cryptology» more  CTRSA 2006»
15 years 8 months ago
A Round and Communication Efficient Secure Ranking Protocol
In this work, we initiate the study of realizing a ranking functionality (m1,
Shaoquan Jiang, Guang Gong
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
CLUSTER
2004
IEEE
15 years 8 months ago
Cluster computing environment supporting single system image
Single system image(SSI) systems have been the mainstay of high-performance computing for many years. SSI requires the integration and aggregation of all types of resources in a c...
Min Choi, DaeWoo Lee, Seung Ryoul Maeng
APCCM
2009
15 years 5 months ago
A Semantic Associative Computation Method for Automatic Decorative-Multimedia Creation with 'Kansei' Information
In the design of multimedia systems, one of the important issues is how to deal with "Kansei" of human beings. The concept of "Kansei" in Japanese includes sev...
Yasushi Kiyoki, Xing Chen
LICS
2002
IEEE
15 years 9 months ago
Computational Adequacy for Recursive Types in Models of Intuitionistic Set Theory
This paper provides a unifying axiomatic account of the interpretation of recursive types that incorporates both domain-theoretic and realizability models as concrete instances. O...
Alex K. Simpson