Sciweavers

1518 search results - page 105 / 304
» Cryptographic Test Correction
Sort
View
160
Voted
IACR
2011
127views more  IACR 2011»
14 years 3 months ago
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Secure multiparty computation (MPC) allows a set of n players to compute any public function, given as an arithmetic circuit, on private inputs, so that privacy of the inputs as we...
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
120
Voted
ISCA
2009
IEEE
137views Hardware» more  ISCA 2009»
15 years 10 months ago
A case for an interleaving constrained shared-memory multi-processor
Shared-memory multi-threaded programming is inherently more difficult than single-threaded programming. The main source of complexity is that, the threads of an application can in...
Jie Yu, Satish Narayanasamy
130
Voted
ICPR
2008
IEEE
16 years 4 months ago
Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap
Several domains such as sports, surgery, dance etc. are characterized by a significant influence of expertise of the performer on the motion pattern and style. The retrieval of ex...
Kanav Kahol, Mithra Vankipuram
97
Voted
IICAI
2007
15 years 5 months ago
Extraction and Translation of Multi-Word Number Expressions
Abstract. This paper describes a tool for extracting multi-word number expressions, calculating their numerical values, and then generating them into another language, thus transla...
Anil Kumar Singh
131
Voted
ENC
2005
IEEE
15 years 9 months ago
SELES: An e-Voting System for Medium Scale Online Elections
— Recent advances in communication networks and cryptographic techniques have made possible to consider online voting systems as a feasible alternative to conventional elections....
Claudia García-Zamora, Francisco Rodr&iacut...