Sciweavers

1199 search results - page 71 / 240
» How to Compare the Power of Computational Models
Sort
View
EUROCRYPT
2007
Springer
15 years 3 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
ACL
2010
14 years 10 months ago
Unsupervised Event Coreference Resolution with Rich Linguistic Features
This paper examines how a new class of nonparametric Bayesian models can be effectively applied to an open-domain event coreference task. Designed with the purpose of clustering c...
Cosmin Adrian Bejan, Sanda M. Harabagiu
CCGRID
2010
IEEE
15 years 2 days ago
Discovering Piecewise Linear Models of Grid Workload
—Despite extensive research focused on enabling QoS for grid users through economic and intelligent resource provisioning, no consensus has emerged on the most promising strategi...
Tamás Éltetö, Cécile Ger...
ACL
2010
14 years 10 months ago
Combining Data and Mathematical Models of Language Change
English noun/verb (N/V) pairs (contract, cement) have undergone complex patterns of change between 3 stress patterns for several centuries. We describe a longitudinal dataset of N...
Morgan Sonderegger, Partha Niyogi
PPOPP
2012
ACM
13 years 7 months ago
Massively parallel breadth first search using a tree-structured memory model
Analysis of massive graphs has emerged as an important area for massively parallel computation. In this paper, it is shown how the Fresh Breeze trees-of-chunks memory model may be...
Tom St. John, Jack B. Dennis, Guang R. Gao