Sciweavers

420 search results - page 40 / 84
» Efficient Implementation of the Orlandi Protocol
Sort
View
IJISEC
2006
108views more  IJISEC 2006»
15 years 17 days ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
SMI
2010
IEEE
218views Image Analysis» more  SMI 2010»
14 years 10 months ago
A Benchmark for 3D Mesh Watermarking
This paper presents a benchmarking system for the evaluation of robust mesh watermarking methods. The proposed benchmark has three different components: a "standard" mesh...
Kai Wang, Guillaume Lavoué, Florence Denis,...
130
Voted
CIKM
2010
Springer
14 years 10 months ago
Building efficient multi-threaded search nodes
Search nodes are single-purpose components of large Web search engines and their efficient implementation is critical to sustain thousands of queries per second and guarantee indi...
Carolina Bonacic, Carlos García, Mauricio M...
CLUSTER
2004
IEEE
15 years 4 months ago
An efficient end-host architecture for cluster communication
Cluster computing environments built from commodity hardware have provided a cost-effective solution for many scientific and high-performance applications. Likewise, middleware te...
Xin Qi, Gabriel Parmer, Richard West
IJCAI
1989
15 years 1 months ago
Learning to Diagnose by Doing
This paper is a study on the process of evolution of a novice to an expert in a diagnostic context. In er, we have chosen an abstract example of a diagnostic problem. The results ...
Jayant Kalagnanam, Eswaran Subrahmanian