Sciweavers

377 search results - page 62 / 76
» Getting to the Point...
Sort
View
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
15 years 7 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai
BMCBI
2008
115views more  BMCBI 2008»
15 years 2 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...
126
Voted
OSDI
2006
ACM
16 years 2 months ago
EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors
Storage systems such as file systems, databases, and RAID systems have a simple, basic contract: you give them data, they do not lose or corrupt it. Often they store the only copy...
Junfeng Yang, Can Sar, Dawson R. Engler
105
Voted
DAC
1999
ACM
16 years 3 months ago
A Novel VLSI Layout Fabric for Deep Sub-Micron Applications
We propose a new VLSI layout methodology which addresses the main problems faced in Deep Sub-Micron (DSM) integrated circuit design. Our layout "fabric" scheme eliminate...
Sunil P. Khatri, Amit Mehrotra, Robert K. Brayton,...
166
Voted
CVPR
2009
IEEE
16 years 14 days ago
Markov Chain Monte Carlo Combined with Deterministic Methods for Markov Random Field Optimization
Many vision problems have been formulated as en- ergy minimization problems and there have been signif- icant advances in energy minimization algorithms. The most widely-used energ...
Wonsik Kim (Seoul National University), Kyoung Mu ...