Sciweavers

2629 search results - page 442 / 526
» Build a Computer from Scratch
Sort
View
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
SC
2004
ACM
15 years 3 months ago
A Performance and Scalability Analysis of the BlueGene/L Architecture
This paper is structured as follows. Section 2 gives an architectural description of BlueGene/L. Section 3 analyzes the issue of “computational noise” – the effect that the o...
Kei Davis, Adolfy Hoisie, Greg Johnson, Darren J. ...
ALGORITHMICA
2011
14 years 5 months ago
On Bounded Leg Shortest Paths Problems
Let V be a set of points in a d-dimensional lp-metric space. Let s, t ∈ V and let L be any real number. An L-bounded leg path from s to t is an ordered set of points which conne...
Liam Roditty, Michael Segal
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
15 years 10 months ago
Distributed classification in peer-to-peer networks
This work studies the problem of distributed classification in peer-to-peer (P2P) networks. While there has been a significant amount of work in distributed classification, most o...
Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi
CHI
2009
ACM
15 years 10 months ago
Remote impact: shadowboxing over a distance
Florian `Floyd' Mueller Distance Lab Horizon Scotland The Enterprise Park Forres, Moray IV36 2AB UK floyd@exertioninterfaces.com Stefan Agamanolis Distance Lab Horizon Scotlan...
Florian Mueller, Stefan Agamanolis, Martin R. Gibb...