Sciweavers

7978 search results - page 42 / 1596
» Representation before computation
Sort
View
EUROCRYPT
2003
Springer
14 years 25 days ago
Fair Secure Two-Party Computation
Abstract Benny Pinkas HP Labs Abstract. We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any sub...
Benny Pinkas
AICCSA
2006
IEEE
142views Hardware» more  AICCSA 2006»
14 years 1 months ago
Pipelining GF(P) Elliptic Curve Cryptography Computation
This paper proposes a new method to compute Elliptic Curve Cryptography in Galois Fields GF(p). The method incorporates pipelining to utilize the benefit of both parallel and seri...
Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim, Ahmad...
SIGCSE
1994
ACM
172views Education» more  SIGCSE 1994»
13 years 11 months ago
Collaborative learning in an introductory computer science course
An experiment in collaborative learning was conducted in two introductory programming courses at Loyola College in Maryland. Data collected included background information on stud...
Roberta Evans Sabin, Edward P. Sabin
ACL
2001
13 years 9 months ago
Computational Properties of Environment-based Disambiguation
The standard pipeline approach to semantic processing, in which sentences are morphologically and syntactically resolved to a single tree before they are interpreted, is a poor fi...
William Schuler
SIGCSE
2002
ACM
138views Education» more  SIGCSE 2002»
13 years 7 months ago
Encouraging women in computer science
At a cost to both their own opportunities and society's ability to produce people with much-needed technical skills, women continue to be underrepresented in computer science...
Eric S. Roberts, Marina Kassianidou, Lilly Irani