Sciweavers

4498 search results - page 34 / 900
» How to Invent Functions
Sort
View
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...
ISPDC
2006
IEEE
14 years 1 months ago
How to Achieve High Throughput with Dynamic Tree-Structured Coterie
Data replication permits a better network bandwidth utilization and minimizes the effect of latency in large-scale systems such as computing grids. However, the cost of maintainin...
Ivan Frain, Abdelaziz Mzoughi, Jean Paul Bahsoun
MM
2005
ACM
123views Multimedia» more  MM 2005»
14 years 1 months ago
How speech/text alignment benefits web-based learning
This demonstration presents an integrated web-based synchronized scenario for many-to-one cross-media correlations between speech (an EFL, English as Foreign Language, lecture wit...
Sheng-Wei Li, Hao-Tung Lin, Herng-Yow Chen
SIGECOM
2005
ACM
130views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Graceful service degradation (or, how to know your payment is late)
When distributing digital content over a broadcast channel it’s often necessary to revoke users whose access privileges have expired, thus preventing them from recovering the co...
Alexandr Andoni, Jessica Staddon
FSE
2005
Springer
112views Cryptology» more  FSE 2005»
14 years 1 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda