Sciweavers

406 search results - page 46 / 82
» The Computation and Application of the Generalized Inverse v...
Sort
View
EUROCRYPT
2004
Springer
14 years 16 days ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
SAGT
2010
Springer
175views Game Theory» more  SAGT 2010»
13 years 7 months ago
On Learning Algorithms for Nash Equilibria
Can learning algorithms find a Nash equilibrium? This is a natural question for several reasons. Learning algorithms resemble the behavior of players in many naturally arising gam...
Constantinos Daskalakis, Rafael Frongillo, Christo...
HPDC
2012
IEEE
11 years 11 months ago
Dynamic adaptive virtual core mapping to improve power, energy, and performance in multi-socket multicores
Consider a multithreaded parallel application running inside a multicore virtual machine context that is itself hosted on a multi-socket multicore physical machine. How should the...
Chang Bae, Lei Xia, Peter A. Dinda, John R. Lange
CANDC
2009
ACM
14 years 3 months ago
Understanding the creative conversation: modeling to engagement
This workshop is aimed at describing the elusive creative process: addressing models and of creative practice, from art to craft, from dance to education. In particular, we wish t...
David A. Shamma, Dan Perkel, Kurt Luther
NETGAMES
2005
ACM
14 years 2 months ago
Patch scheduling for on-line games
One of the challenges facing the on-line gaming community is the delivery of new content to players. While the initial distribution of a game is typically done via large media for...
Chris Chambers, Wu-chang Feng