Sciweavers

188 search results - page 7 / 38
» Practical Two-Party Computation Based on the Conditional Gat...
Sort
View
100
Voted
NDSS
2003
IEEE
15 years 4 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
98
Voted
CCS
2006
ACM
15 years 3 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
84
Voted
VLSID
2008
IEEE
149views VLSI» more  VLSID 2008»
15 years 12 months ago
NBTI Degradation: A Problem or a Scare?
Negative Bias Temperature Instability (NBTI) has been identified as a major and critical reliability issue for PMOS devices in nano-scale designs. It manifests as a negative thres...
Kewal K. Saluja, Shriram Vijayakumar, Warin Sootka...
ECAL
2003
Springer
15 years 4 months ago
Conditions for Stable Vowel Systems in a Population
This paper describes an investigation of two computer models of how vowel systems can be transferred from one generation to the next. Humans tend to reduce the articulation of the ...
Bart de Boer
100
Voted
AGP
1997
IEEE
15 years 3 months ago
Safe Folding/Unfolding with Conditional Narrowing
Abstract. Functional logic languages with a complete operational semantics are based on narrowing, a generalization of term rewriting where unification replaces matching. In this ...
María Alpuente, Moreno Falaschi, Giné...