Sciweavers

8825 search results - page 77 / 1765
» All for one or one for all
Sort
View
EUROCRYPT
2007
Springer
15 years 5 months ago
Revisiting the Efficiency of Malicious Two-Party Computation
In a recent paper Mohassel and Franklin study the efficiency of secure two-party computation in the presence of malicious behavior. Their aim is to make classical solutions to this...
David P. Woodruff
FSTTCS
2006
Springer
15 years 4 months ago
Unbiased Rounding of Rational Matrices
Rounding a real-valued matrix to an integer one such that the rounding errors in all rows and columns are less than one is a classical problem. It has been applied to hypergraph co...
Benjamin Doerr, Christian Klein
ESANN
2006
15 years 2 months ago
Time series prediction using DirRec strategy
This paper demonstrates how the selection of Prediction Strategy is important in the Long-Term Prediction of Time Series. Two strategies are already used in the prediction purposes...
Antti Sorjamaa, Amaury Lendasse
CORR
2008
Springer
85views Education» more  CORR 2008»
15 years 1 months ago
New Estimation Procedures for PLS Path Modelling
: Given R groups of numerical variables X1, ... XR, we assume that each group is the result of one underlying latent variable, and that all latent variables are bound together thro...
Xavier Bry
EOR
2010
101views more  EOR 2010»
15 years 1 months ago
Random yield supply chain with a yield dependent secondary market
Random yield affects production decisions and performances of all parties in a supply chain. We study a simple supply chain with one supplier and one retailer where there is rando...
Yuanjie He, Jiang Zhang