Sciweavers

9405 search results - page 318 / 1881
» Computing a Model of Set Theory
Sort
View
ASIACRYPT
2007
Springer
15 years 11 months ago
Two-Party Computing with Encrypted Data
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense ...
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malki...
ICNC
2005
Springer
15 years 10 months ago
On the Categorizing of Simply Separable Relations in Partial Four-Valued Logic
In completeness theories of multiple-valued logic, the characterization of Sheffer functions is an important problem,and the solution can be reduced to determining the minimal co...
Renren Liu, Zhiwei Gong, Fen Xu
MICRO
2010
IEEE
173views Hardware» more  MICRO 2010»
15 years 2 months ago
Single-Chip Heterogeneous Computing: Does the Future Include Custom Logic, FPGAs, and GPGPUs?
To extend the exponential performance scaling of future chip multiprocessors, improving energy efficiency has become a first-class priority. Single-chip heterogeneous computing ha...
Eric S. Chung, Peter A. Milder, James C. Hoe, Ken ...
150
Voted
CORR
2004
Springer
104views Education» more  CORR 2004»
15 years 4 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
SASO
2007
IEEE
15 years 11 months ago
Novel Mathematics-Inspired Algorithms for Self-Adaptive Peer-to-Peer Computing
This paper describes, and evaluates benefits of, a design methodology to translate certain mathematical models into the design of novel, self-adaptive, peer-to-peer (p2p) distrib...
Steven Y. Ko, Indranil Gupta, Yookyung Jo