Sciweavers

1893 search results - page 155 / 379
» Computational composites
Sort
View
STOC
2010
ACM
227views Algorithms» more  STOC 2010»
15 years 5 months ago
On the Round Complexity of Covert Computation
In STOC’05, von Ahn, Hopper and Langford introduced the notion of covert computation. In covert computation, a party runs a secure computation protocol over a covert (or stegano...
Vipul Goyal and Abhishek Jain
108
Voted
IIE
2007
114views more  IIE 2007»
15 years 22 days ago
Design and Implementation of a Logo-based Computer Graphics Course
Two years ago the Faculty of Mathematics and Informatics at Sofia University makes a decision to design a new series of Logo-based courses which make use of the modern technology....
Pavel Boytchev
DATE
2006
IEEE
100views Hardware» more  DATE 2006»
15 years 6 months ago
Heterogeneous behavioral hierarchy for system level designs
Enhancing productivity for designing complex embedded systems requires system level design methodology and language support for capturing complex design in high level models. For ...
Hiren D. Patel, Sandeep K. Shukla, Reinaldo A. Ber...
MM
2004
ACM
124views Multimedia» more  MM 2004»
15 years 6 months ago
Towards an integrated multimedia service hosting overlay
With the proliferation of multimedia data sources on the Internet, we envision an increasing demand for value-added and functionrich multimedia services that transport, process, a...
Dongyan Xu, Xuxian Jiang
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell