Sciweavers

1005 search results - page 54 / 201
» Practical Secure Function Evaluation
Sort
View
FC
2003
Springer
133views Cryptology» more  FC 2003»
14 years 2 months ago
Secure Generalized Vickrey Auction Using Homomorphic Encryption
Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a com...
Koutarou Suzuki, Makoto Yokoo
ISCI
2007
152views more  ISCI 2007»
13 years 8 months ago
Evaluating digital video recorder systems using analytic hierarchy and analytic network processes
Digital video recorder (DVR) systems are novel security products with significant potential for application in the surveillance market, which, like many other areas of security t...
Che-Wei Chang, Cheng-Ru Wu, Chin-Tsai Lin, Hung-Lu...
ASPDAC
2009
ACM
164views Hardware» more  ASPDAC 2009»
14 years 3 months ago
Accounting for non-linear dependence using function driven component analysis
Majority of practical multivariate statistical analyses and optimizations model interdependence among random variables in terms of the linear correlation among them. Though linear...
Lerong Cheng, Puneet Gupta, Lei He
JDCTA
2010
172views more  JDCTA 2010»
13 years 3 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
JIS
2007
129views more  JIS 2007»
13 years 8 months ago
Employing log metrics to evaluate search behaviour and success: case study BBC search engine
Argues that metrics can be generated from search transactional Web logs that can help evaluate search engine effectiveness. Search logs from the BBC Website were analysed and metr...
Paul Huntington, David Nicholas, Hamid R. Jamali M...