Sciweavers

1005 search results - page 146 / 201
» Practical Secure Function Evaluation
Sort
View
ANOR
2010
112views more  ANOR 2010»
13 years 8 months ago
Online stochastic optimization under time constraints
This paper considers online stochastic optimization problems where uncertainties are characterized by a distribution that can be sampled and where time constraints severely limit t...
Pascal Van Hentenryck, Russell Bent, Eli Upfal
EVOW
2010
Springer
14 years 5 months ago
The Problem with Evolutionary Art Is ..
Computational evolutionary art has been an active practice for at least 20 years. Given the remarkable advances in that time in other realms of computing, including other forms of ...
Philip Galanter
IFIP
2000
Springer
14 years 2 months ago
Information Systems Conceptual Foundations: Looking Backward and Forward
The academic field of information systems has developed because organizations use a specialized body of knowledge about information and communications systems. Teaching and resear...
Gordon B. Davis
ML
2006
ACM
14 years 4 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII
DRM
2005
Springer
14 years 3 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi