Sciweavers

3937 search results - page 150 / 788
» Questioning Ubiquitous Computing
Sort
View
112
Voted
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 8 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...
103
Voted
DEXAW
2004
IEEE
97views Database» more  DEXAW 2004»
15 years 6 months ago
A Conceptual Model Based Distance Learning System for Computer Literacy
In distance learning for computer literacy, a student's skill is dependent on personal experience. In such cases, it is important to determine the student's understandin...
Yoshiki Murotani, Minoru Uehara, Hideki Mori
91
Voted
SIAMDM
2010
84views more  SIAMDM 2010»
15 years 1 months ago
On Computing the Frequencies of Induced Subhypergraphs
Let F be an r-uniform hypergraph with f vertices, where f > r ≥ 3. In [12], R. Yuster posed the problem of whether there exists an algorithm which, for a given r-uniform hyper...
Brendan Nagle
KES
1998
Springer
15 years 6 months ago
Attractor systems and analog computation
Attractor systems are useful in neurodynamics,mainly in the modelingof associative memory. Thispaper presentsa complexity theory for continuous phase space dynamical systems with ...
Hava T. Siegelmann, Shmuel Fishman
CORR
2007
Springer
113views Education» more  CORR 2007»
15 years 2 months ago
Geometry and the complexity of matrix multiplication
We survey results in algebraic complexity theory, focusing on matrix multiplication. Our goals are (i.) to show how open questions in algebraic complexity theory are naturally pose...
J. M. Landsberg