Sciweavers

1895 search results - page 222 / 379
» Modular Functional Descriptions
Sort
View
TCC
2012
Springer
218views Cryptology» more  TCC 2012»
12 years 3 months ago
Iterative Constructions and Private Data Release
In this paper we study the problem of approximately releasing the cut function of a graph while preserving differential privacy, and give new algorithms (and new analyses of exis...
Anupam Gupta, Aaron Roth, Jonathan Ullman
CCS
2008
ACM
13 years 10 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
ICWS
2004
IEEE
13 years 9 months ago
External Matching in UDDI
As the set of available Web Services expands, it becomes increasingly important to have automated tools to help identify services that match a requester's requirements. Findi...
John Colgrave, Rama Akkiraju, Richard Goodwin
WWW
2006
ACM
14 years 8 months ago
Relaxed: on the way towards true validation of compound documents
To maintain interoperability in the Web environment it is necessary to comply with Web standards. Current specifications of HTML and XHTML languages define conformance conditions ...
Jirka Kosek, Petr Nálevka
WWW
2001
ACM
14 years 8 months ago
ViBE: virtual biology experiments
The virtual laboratories enhance learning experiences by providing the student with a supplement to the physical lab. The laboratories allow students to perform exercises as in an...
Rajaram Subramanian, Ivan Marsic