Sciweavers

1005 search results - page 40 / 201
» Practical Secure Function Evaluation
Sort
View
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
IAT
2009
IEEE
14 years 3 months ago
Automated Web Site Evaluation - An Approach Based on Ranking SVM
This paper proposes an automated web site evaluation approach using machine learning to cope with ranking problems. Evaluating web sites is a significant task for web service beca...
Peng Li, Seiji Yamada
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 21 days ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
IROS
2006
IEEE
113views Robotics» more  IROS 2006»
14 years 2 months ago
A Hybrid Approach to Practical Self Collision Detection System of Humanoid Robot
— Online self collision detection system for humanoid robots is an essentially important function for developing sensor based behaviors without worrying about breaking hardware. ...
Kei Okada, Masayuki Inaba
ISPDC
2010
IEEE
13 years 7 months ago
Practical Uniform Peer Sampling under Churn
—Providing independent uniform samples from a system population poses considerable problems in highly dynamic settings, like P2P systems, where the number of participants and the...
Roberto Baldoni, Marco Platania, Leonardo Querzoni...