Sciweavers

678 search results - page 72 / 136
» A Universal Framework for Self-Replication
Sort
View
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
15 years 4 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
TCC
2009
Springer
160views Cryptology» more  TCC 2009»
15 years 10 months ago
Simple, Black-Box Constructions of Adaptively Secure Protocols
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious ad...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
CHI
2008
ACM
15 years 10 months ago
Creativity interventions: physical-digital activities for promoting group creativity
Arizona State University's Arts, Media, and Engineering Program is currently addressing the need to assess the growth of group creativity in trans-disciplinary collaboration....
Lisa M. Tolentino, Aisling Kelliher, David Birchfi...
FASE
2010
Springer
15 years 4 months ago
Reusing Model Transformations While Preserving Properties
Abstract. Model transformations are indispensable to model-based development (MBD) where they act as translators between domain-specific languages (DSLs). As a result, transformat...
Ethan K. Jackson, Wolfram Schulte, Daniel Balasubr...
BIRTHDAY
2009
Springer
15 years 4 months ago
The KBMS Project and Beyond
The Knowledge Base Management Systems (KBMS) Project at the University of Toronto (1985-1995) was inspired by a need for advanced knowledge representation applications that require...
Vinay K. Chaudhri, Igor Jurisica, Manolis Koubarak...