Sciweavers

5344 search results - page 27 / 1069
» Privacy-Preserving Set Operations
Sort
View
SIBGRAPI
2000
IEEE
14 years 2 months ago
Incremental Evaluation of BDD-Represented Set Operators
Heraldo Maciel França Madeira, Junior Barre...
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
13 years 11 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
IWEC
2008
13 years 11 months ago
Experiences Employing Novice Wizard Operators in a Gallery Setting
During a 11-week installation of an immersive augmented reality (AR) experience at an art and technology gallery, we faced the practical challenges of preparing for live public aud...
Steven Dow, Blair MacIntyre
CPAIOR
2008
Springer
13 years 11 months ago
Filtering Atmost1 on Pairs of Set Variables
Willem Jan van Hoeve, Ashish Sabharwal