Sciweavers

334 search results - page 36 / 67
» trust 2010
Sort
View
GECCO
2010
Springer
180views Optimization» more  GECCO 2010»
14 years 1 months ago
Comparison of NEWUOA with different numbers of interpolation points on the BBOB noisy testbed
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Raymond Ros
ACNS
2010
Springer
132views Cryptology» more  ACNS 2010»
14 years 1 months ago
Efficient Implementation of the Orlandi Protocol
Abstract. We present an efficient implementation of the Orlandi protocol which is the first implementation of a protocol for multiparty computation on arithmetic circuits, which is...
Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Niel...
FC
2010
Springer
175views Cryptology» more  FC 2010»
13 years 11 months ago
Cryptographic Cloud Storage
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We...
Seny Kamara, Kristin Lauter
JUCS
2010
217views more  JUCS 2010»
13 years 8 months ago
The 3A Personalized, Contextual and Relation-based Recommender System
Abstract: This paper discusses the 3A recommender system that targets CSCL (computersupported collaborative learning) and CSCW (computer-supported collaborative work) environments....
Sandy El Helou, Christophe Salzmann, Denis Gillet
SIGKDD
2010
159views more  SIGKDD 2010»
13 years 8 months ago
Providing K-Anonymity in location based services
The offering of anonymity in relational databases has attracted a great deal of attention in the database community during the last decade [4]. Among the different solution appr...
Aris Gkoulalas-Divanis, Panos Kalnis, Vassilios S....