Sciweavers

1760 search results - page 304 / 352
» Connected Set Cover Problem and Its Applications
Sort
View
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 9 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
STOC
2001
ACM
147views Algorithms» more  STOC 2001»
14 years 8 months ago
Conditions on input vectors for consensus solvability in asynchronous distributed systems
This article introduces and explores the condition-based approach to solve the consensus problem in asynchronous systems. The approach studies conditions that identify sets of inpu...
Achour Mostéfaoui, Michel Raynal, Sergio Ra...
ICS
2010
Tsinghua U.
14 years 5 months ago
Robustness of the Learning with Errors Assumption
: Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are s...
Shafi Goldwasser, Yael Kalai, Chris Peikert, Vinod...
HICSS
2009
IEEE
118views Biometrics» more  HICSS 2009»
14 years 2 months ago
Decentralized Reactive Power Dispatch for a Time-Varying Multi-TSO System
This paper addresses the problem of reactive power dispatch in a power system partitioned into several areas controlled by different transmission system operators. Previous resear...
Yannick Phulpin, Miroslav Begovic, Marc Petit, Dam...
VMCAI
2009
Springer
14 years 2 months ago
Reducing Behavioural to Structural Properties of Programs with Procedures
Abstract There is an intimate link between program structure and behaviour. Exploiting this link to phrase program correctness problems in terms of the structural properties of a p...
Dilian Gurov, Marieke Huisman