Sciweavers

1005 search results - page 33 / 201
» Practical Secure Function Evaluation
Sort
View
LADC
2007
Springer
14 years 2 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
DEXAW
2009
IEEE
124views Database» more  DEXAW 2009»
14 years 3 months ago
Performance Comparison of Secure Comparison Protocols
Secure Multiparty Computation (SMC) has gained tremendous importance with the growth of the Internet and E-commerce, where mutually untrusted parties need to jointly compute a fun...
Florian Kerschbaum, Debmalya Biswas, Sebastiaan de...
AAAI
2010
13 years 10 months ago
Reinforcement Learning Via Practice and Critique Advice
We consider the problem of incorporating end-user advice into reinforcement learning (RL). In our setting, the learner alternates between practicing, where learning is based on ac...
Kshitij Judah, Saikat Roy, Alan Fern, Thomas G. Di...
SIGCSE
1996
ACM
163views Education» more  SIGCSE 1996»
14 years 29 days ago
Database theory in practice: learning from cooperative group projects
lhis paper describes the use of cooperative group learning concepts in support of an undergraduate database mrtnagement course that emphasizes the theoretical and practical aspect...
Suzanne W. Dietrich, Susan Darling Urban
FORTE
2004
13 years 10 months ago
PEPA Nets in Practice: Modelling a Decentralised Peer-to-Peer Emergency Medical Application
Abstract. We apply the PEPA nets modelling language to modelling a peer-topeer medical informatics application, the FieldCare PDA-based medical records system developed by SINTEF T...
Stephen Gilmore, Valentin Haenel, Jane Hillston, L...