Sciweavers

75 search results - page 1 / 15
» How to Improve an Exponentiation Black-Box
Sort
View
59
Voted
EUROCRYPT
1998
Springer
15 years 1 months ago
How to Improve an Exponentiation Black-Box
Abstract. In this paper we present a method for improving the performance of RSA-type exponentiations. The scheme is based on the observation that replacing the exponent d by d = d...
Gérard D. Cohen, Antoine Lobstein, David Na...
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
GECCO
2010
Springer
230views Optimization» more  GECCO 2010»
15 years 2 months ago
Exponential natural evolution strategies
The family of natural evolution strategies (NES) offers a principled approach to real-valued evolutionary optimization by following the natural gradient of the expected fitness....
Tobias Glasmachers, Tom Schaul, Yi Sun, Daan Wiers...
CSCW
2000
ACM
15 years 1 months ago
Explaining collaborative filtering recommendations
Automated collaborative filtering (ACF) systems predict a person’s affinity for items or information by connecting that person’s recorded interests with the recorded interests...
Jonathan L. Herlocker, Joseph A. Konstan, John Rie...
81
Voted
HIPC
2004
Springer
15 years 2 months ago
Autonomic Storage System Based on Automatic Learning
In this paper, we present a system capable of improving the I/O performance in an automatic way. This system is able to learn the behavior of the applications running on top and ...
Francisco Hidrobo, Toni Cortes