Sciweavers

562 search results - page 15 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
147
Voted
CCS
2009
ACM
15 years 10 months ago
Privacy-preserving genomic computation through program specialization
In this paper, we present a new approach to performing important classes of genomic computations (e.g., search for homologous genes) that makes a significant step towards privacy...
Rui Wang, XiaoFeng Wang, Zhou Li, Haixu Tang, Mich...
150
Voted
TMM
2010
181views Management» more  TMM 2010»
14 years 10 months ago
Mining Group Nonverbal Conversational Patterns Using Probabilistic Topic Models
Abstract--The automatic discovery of group conversational behavior is a relevant problem in social computing. In this paper, we present an approach to address this problem by defin...
Dinesh Babu Jayagopi, Daniel Gatica-Perez
TAMODIA
2007
15 years 5 months ago
Exploring Usability Needs by Human-Computer Interaction Patterns
Abstract. Covering quality aspects such as usability through the software development life cycle is challenging. These “-ilities” are generally difficult to grasp and usually ...
Markus Specker, Ina Wentzlaff
SIAMCOMP
2011
14 years 10 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
133
Voted
ASIACRYPT
2008
Springer
15 years 5 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas