Sciweavers

1781 search results - page 239 / 357
» Functional Answer Set Programming
Sort
View
MP
2007
76views more  MP 2007»
15 years 1 months ago
Universal duality in conic convex optimization
Given a primal-dual pair of linear programs, it is well known that if their optimal values are viewed as lying on the extended real line, then the duality gap is zero, unless both...
Simon P. Schurr, André L. Tits, Dianne P. O...
ICALP
2007
Springer
15 years 3 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
STOC
2012
ACM
236views Algorithms» more  STOC 2012»
13 years 4 months ago
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
We propose a new notion of secure multiparty computation aided by a computationally-powerful but untrusted “cloud” server. In this notion that we call on-the-fly multiparty c...
Adriana López-Alt, Eran Tromer, Vinod Vaiku...
SIGUCCS
2000
ACM
15 years 6 months ago
Designing the "IT Degree" for Student Employees
Academic Technology Services at the University of Rochester is in the process of revamping its student staff training program. This is in an effort to provide top-notch customer s...
Lisa Tanger-Brown, Janak Gada
ISCI
1998
91views more  ISCI 1998»
15 years 1 months ago
The Improper Fuzzy Riemann Integral and its Numerical Integration
The improper fuzzy Riemann integral and its numerical integration are proposed in this paper. Under the setting of the improper fuzzy Riemann integral, we can ®nd the expectation...
Hsien-Chung Wu