Sciweavers

156 search results - page 12 / 32
» On the Round Complexity of Covert Computation
Sort
View
FOCS
2007
IEEE
14 years 1 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
ICNS
2007
IEEE
14 years 1 months ago
Performance Evaluation of Real-Time Message Delivery in RDM Algorithm
Complexity of distributed real-time applications such as automotive electronics has increased dramatically over the last couple of years. As a result, developing communication pro...
Shabnam Mirshokraie, Mojtaba Sabeghi, Mahmoud Nagh...
ARCS
2010
Springer
13 years 7 months ago
A Tightly Coupled Accelerator Infrastructure for Exact Arithmetics
Processor speed and available computing power constantly increases, enabling computation of more and more complex problems such as numerical simulations of physical processes. In t...
Fabian Nowak, Rainer Buchty
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 8 months ago
Complete Fairness in Multi-party Computation without an Honest Majority
Gordon et al. recently showed that certain (non-trivial) functions can be computed with complete fairness in the two-party setting. Motivated by their results, we initiate a study...
S. Dov Gordon, Jonathan Katz
ICMCS
2006
IEEE
163views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Methods for None Intrusive Delay Measurment for Audio Communication over Packet Networks
Measurement of the delay is an important and common problem in communication over packet networks. The endto-end and the round trip delay are among the factors directly impacting ...
Mohammad Zad-issa, Norbert Rossello, Laurent Pilat...