Sciweavers

1628 search results - page 68 / 326
» Compiler Construction Using Scheme
Sort
View
ESORICS
2006
Springer
15 years 3 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
85
Voted
OSDI
2008
ACM
16 years 4 days ago
Binary Translation Using Peephole Superoptimizers
We present a new scheme for performing binary translation that produces code comparable to or better than existing binary translators with much less engineering effort. Instead of...
Sorav Bansal, Alex Aiken
VMV
2000
169views Visualization» more  VMV 2000»
15 years 1 months ago
A Non-Linear Subdivision Scheme for Triangle Meshes
Subdivision schemes are commonly used to obtain dense or smooth data representations from sparse discrete data. E. g., B-splines are smooth curves or surfaces that can be construc...
Stefan Karbacher, Stephan Seeger, Gerd Häusle...
CTRSA
2006
Springer
157views Cryptology» more  CTRSA 2006»
15 years 3 months ago
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
Abstract. In this paper we present a general framework for constructing efficient multicast cryptosystems with provable security and show that a line of previous work on multicast ...
Yitao Duan, John F. Canny
LREC
2010
149views Education» more  LREC 2010»
15 years 1 months ago
Emotion Cause Events: Corpus Construction and Analysis
Emotion processing has always been a great challenge. Given the fact that an emotion is triggered by cause events and that cause events are an integral part of emotion, this paper...
Sophia Yat Mei Lee, Ying Chen, Shoushan Li, Chu-Re...