Sciweavers

1631 search results - page 219 / 327
» Observing Functional Logic Computations
Sort
View
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
ESOP
2000
Springer
15 years 1 months ago
Compile-Time Debugging of C Programs Working on Trees
We exhibit a technique for automatically verifying the safety of simple C programs working on tree-shaped data structures. We do not consider the complete behavior of programs, but...
Jacob Elgaard, Anders Møller, Michael I. Sc...
ICPR
2008
IEEE
15 years 11 months ago
HOPS: Efficient region labeling using Higher Order Proxy Neighborhoods
We present the Higher Order Proxy Neighborhoods (HOPS) approach to modeling higher order neighborhoods in Markov Random Fields (MRFs). HOPS incorporates more context information i...
Albert Y. C. Chen, Jason J. Corso, Le Wang
RECOMB
2009
Springer
15 years 10 months ago
COE: A General Approach for Efficient Genome-Wide Two-Locus Epistasis Test in Disease Association Study
The availability of high density single nucleotide polymorphisms (SNPs) data has made genome-wide association study computationally challenging. Twolocus epistasis (gene-gene inter...
Xiang Zhang, Feng Pan, Yuying Xie, Fei Zou, Wei Wa...
CHI
2005
ACM
15 years 10 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...