Sciweavers

3341 search results - page 419 / 669
» A Communication Virtual Machine
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 5 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
OSDI
2006
ACM
16 years 5 months ago
HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance
There are currently two approaches to providing Byzantine-fault-tolerant state machine replication: a replica-based approach, e.g., BFT, that uses communication between replicas t...
James A. Cowling, Daniel S. Myers, Barbara Liskov,...
ICIA
2007
15 years 7 months ago
Learning Interaction between Conflicting Human Agents and Their Assistants
We build the generic methodology based on machine learning and reasoning to detect the patterns of interaction between conflicting agents, including humans and their assistants. L...
Boris Galitsky, Boris Kovalerchuk
BMCBI
2008
163views more  BMCBI 2008»
15 years 5 months ago
i-SEGOPubmed: a web interface for semantic enabled browsing of PubMed using Gene Ontology
imately 20 million abstracts. Browsing such a huge repository to find relevant information as well as providing elearning service requires new generation of interfaces. Methods suc...
Mohammed Yeasin, Bhanu Vanteru, Jahangheer S. Shai...
CHI
2002
ACM
16 years 5 months ago
Informing automatic generation of remote control interfaces with human designs
Embedded processors are making it possible for common appliances, such as cable boxes, microwaves and fax machines, to provide even more functionality. Unfortunately, as these app...
Jeffrey Nichols