In 2008, the systems and networks research communities find themselves victims of their own successes. This white paper reviews some of the evidence that the two areas are under e...
It is well known that universally composable multiparty computation cannot, in general, be achieved in the standard model without setup assumptions when the adversary can corrupt a...
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
In this paper we discuss several challenges associated scientific workflow design and management in distributed, heterogeneous environments. Based on our prior work with a number ...
Standard numerical analysis tools, combined with elementary calculus, are deployed to evaluate a densely and wildly oscillatory integral proposed as a computational problem in the...