Sciweavers

1585 search results - page 90 / 317
» Automatically optimizing secure computation
Sort
View
TROB
2002
120views more  TROB 2002»
15 years 4 months ago
DPAC: an object-oriented distributed and parallel computing framework for manufacturing applications
Parallel and distributed computing infrastructure are increasingly being embraced in the context of manufacturing applications, including real-time scheduling. In this paper, we pr...
N. R. Srinivasa Raghavan, Tanmay Waghmare
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
118
Voted
IPPS
2007
IEEE
15 years 11 months ago
Middleware and Performance Issues for Computational Finance Applications on Blue Gene/L
We discuss real-world case studies involving the implementation of a web services middleware tier for the IBM Blue Gene/L supercomputer to support financial business applications...
Thomas Phan, Ramesh Natarajan, Satoki Mitsumori, H...
AFRICACRYPT
2010
Springer
15 years 11 months ago
Avoiding Full Extension Field Arithmetic in Pairing Computations
Abstract. The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of ...
Craig Costello, Colin Boyd, Juan Manuel Gonz&aacut...
CHI
2005
ACM
16 years 5 months ago
Tuning and testing scrolling interfaces that automatically zoom
Speed dependent automatic zooming (SDAZ) is a promising refinement to scrolling in which documents are automatically zoomed-out as the scroll rate increases. By automatically zoom...
Andy Cockburn, Joshua Savage, Andrew Wallace