Sciweavers

2830 search results - page 427 / 566
» No Science without Semantics
Sort
View
121
Voted
FOCS
2004
IEEE
15 years 7 months ago
Universally Composable Protocols with Relaxed Set-Up Assumptions
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) protocols provide th...
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafa...
122
Voted
STOC
1991
ACM
84views Algorithms» more  STOC 1991»
15 years 7 months ago
Self-Testing/Correcting for Polynomials and for Approximate Functions
The study of self-testing/correcting programs was introduced in [8] in order to allow one to use program P to compute function f without trusting that P works correctly. A self-te...
Peter Gemmell, Richard J. Lipton, Ronitt Rubinfeld...
142
Voted
BALT
2008
15 years 5 months ago
Flexible Database Platform for Biomedical Research with Multiple User Interfaces and a Universal Query Engine
Biomedical research on human subjects often requires a large amount of data to be collected by personal interviews, Internet based questionnaires, lab measurements or by extracting...
Margus Jäger, Liina Kamm, Darja Krushevskaja,...
138
Voted
CCS
2008
ACM
15 years 5 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
141
Voted
ACMSE
2005
ACM
15 years 5 months ago
Generative approaches for application tailoring of mobile devices
The popularity of mobile devices has propelled the development of many useful location-aware applications. However, the heterogeneity of mobile devices necessitates that the softw...
Victoria Davis, Jeff Gray, Joel Jones