Sciweavers

14699 search results - page 297 / 2940
» Complexity and Cognitive Computing
Sort
View
JCIT
2010
158views more  JCIT 2010»
14 years 11 months ago
Improvement of a Secure Convex Hull Two-Party Computation Protocol
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...
Wenjie Zhao, Mingxing He
AB
2008
Springer
15 years 10 months ago
On the Computational Power of Biochemistry
We explore the computational power of biochemistry with respect to basic chemistry, identifying complexation as the basic mechanism that distinguishes the former from the latter. W...
Luca Cardelli, Gianluigi Zavattaro
ACII
2005
Springer
15 years 10 months ago
Generalization of a Vision-Based Computational Model of Mind-Reading
This paper describes a vision-based computational model of mind-reading that infers complex mental states from head and facial expressions in real-time. The generalization ability ...
Rana El Kaliouby, Peter Robinson
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai
TCS
2008
15 years 4 months ago
Fine hierarchies and m-reducibilities in theoretical computer science
This is a survey of results about versions of fine hierarchies and many-one reducibilities that appear in different parts of theoretical computer science. These notions and relate...
Victor L. Selivanov