Sciweavers

2315 search results - page 284 / 463
» Does EigenPalm work
Sort
View
ATAL
2007
Springer
14 years 2 months ago
Eliciting single-peaked preferences using comparison queries
Voting is a general method for aggregating the preferences of multiple agents. Each agent ranks all the possible alternatives, and based on this, an aggregate ranking of the alter...
Vincent Conitzer
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
14 years 2 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
14 years 1 months ago
The Value Relevance of Information Technology Investment Announcements: Incorporating Industry Strategic IT Role
: This research note both confirms and extends the value relevance of information technology announcements found by Im et al (2001) and Dos Santos et al. (1993). We extend their wo...
Vernon J. Richardson, Robert W. Zmud
CRYPTO
2001
Springer
202views Cryptology» more  CRYPTO 2001»
14 years 22 days ago
Revocation and Tracing Schemes for Stateless Receivers
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of...
Dalit Naor, Moni Naor, Jeffery Lotspiech
IPPS
2000
IEEE
14 years 18 days ago
Three Dimensional VLSI-Scale Interconnects
As processor speeds rapidly approach the Giga-Hertz regime, the disparity between process time and memory access time plays an increasing role in the overall limitation of processo...
Dennis W. Prather