We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
—Shortest distance query between two nodes is a fundamental operation in large-scale networks. Most existing methods in the literature take a landmark embedding approach, which s...
Display ads on the Internet are often sold in bundles of thousands or millions of impressions over a particular time period, typically weeks or months. Ad serving systems that ass...
In this paper, we describe the process we went through to redesign our training program in order to make it more targeted to the individual user, more responsive to a constantly c...
pc.sagepub.com/cgi/content/abstract/22/3/284 The online version of this article can be found at: Published by: http://www.sagepublications.com can be found at:International Journal...
Wanchun Dou, Jinjun Chen, Jianxun Liu, S. C. Cheun...