Sciweavers

4702 search results - page 186 / 941
» How to Copyright a Function
Sort
View
CIKM
2011
Springer
14 years 4 months ago
Do all birds tweet the same?: characterizing twitter around the world
Social media services have spread throughout the world in just a few years. They have become not only a new source of information, but also new mechanisms for societies world-wide...
Barbara Poblete, Ruth Garcia, Marcelo Mendoza, Ale...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 7 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
EUROCRYPT
2012
Springer
13 years 7 months ago
Fully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorp...
Craig Gentry, Shai Halevi, Nigel P. Smart
ECLIPSE
2007
ACM
15 years 8 months ago
Informing Eclipse API production and consumption
Application programming interfaces (APIs) inform application developers as to the functionality provided by a library and how to interact with it. APIs are a double-edged sword: i...
Reid Holmes, Robert J. Walker

Book
267views
17 years 25 days ago
Advanced Programming for the Java 2 Platform
"As an experienced developer on the Java platform, you undoubtedly know how fast moving and comprehensive the platform is. Its many application programming interfaces (APIs) p...
Calvin Austin and Monica Pawlan