Sciweavers

3238 search results - page 299 / 648
» Multi-return function call
Sort
View
CCS
2010
ACM
15 years 9 months ago
Bureaucratic protocols for secure two-party sorting, selection, and permuting
In this paper, we introduce a framework for secure two-party (S2P) computations, which we call bureaucratic computing, and we demonstrate its efficiency by designing practical S2P...
Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenlia...
EVOW
2010
Springer
15 years 9 months ago
Learning to Dance through Interactive Evolution
A relatively rare application of artificial intelligence at the nexus of art and music is dance. The impulse shared by all humans to express ourselves through dance represents a u...
Greg A. Dubbin, Kenneth O. Stanley
DASFAA
2009
IEEE
104views Database» more  DASFAA 2009»
15 years 9 months ago
On the Discovery of Conserved XML Query Patterns for Evolution-Conscious Caching
Existing xml query pattern-based caching strategies focus on extracting the set of frequently issued query pattern trees (qpt) based on the support of the qpts in the history. Thes...
Sourav S. Bhowmick
SAC
2009
ACM
15 years 9 months ago
Modular implementation of adaptive decisions in stochastic simulations
We present a modular approach to implement adaptive decisions with existing scientific codes. Using a sophisticated system software tool based on the function call interception t...
Pilsung Kang 0002, Yang Cao, Naren Ramakrishnan, C...
DSN
2009
IEEE
15 years 9 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis