Sciweavers

347 search results - page 66 / 70
» Some Second Order Set Theory
Sort
View
ICSE
1993
IEEE-ACM
13 years 11 months ago
Prototyping a Process Monitoring Experiment
Features are often the basic unit of development for a very large software systems and represent long-term efforts, spanning up to several years from inception to actual use. Deve...
Mark G. Bradac, Dewayne E. Perry, Lawrence G. Vott...
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
13 years 10 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
NIPS
2007
13 years 8 months ago
An Analysis of Convex Relaxations for MAP Estimation
The problem of obtaining the maximum a posteriori estimate of a general discrete random field (i.e. a random field defined using a finite and discrete set of labels) is known ...
Pawan Mudigonda, Vladimir Kolmogorov, Philip H. S....
MANSCI
2007
86views more  MANSCI 2007»
13 years 7 months ago
Proper Conditioning for Coherent VaR in Portfolio Management
Value at Risk (VaR) is a central concept in risk management. As stressed by Artzner et al. (1999), VaR may not possess the subadditivity property required to be a coherent measure...
René Garcia, Éric Renault, Georges T...
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 7 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim