Sciweavers

848 search results - page 69 / 170
» Randomness and the linear degrees of computability
Sort
View
FOCS
2006
IEEE
15 years 5 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
ICA
2004
Springer
15 years 5 months ago
Analytical Solution of the Blind Source Separation Problem Using Derivatives
In this paper, we consider independence property between a random process and its first derivative. Then, for linear mixtures, we show that cross-correlations between mixtures and...
Sebastien Lagrange, Luc Jaulin, Vincent Vigneron, ...
EUROCRYPT
2007
Springer
15 years 3 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
SIGMOD
2007
ACM
165views Database» more  SIGMOD 2007»
16 years 1 hour ago
Sharing aggregate computation for distributed queries
An emerging challenge in modern distributed querying is to efficiently process multiple continuous aggregation queries simultaneously. Processing each query independently may be i...
Ryan Huebsch, Minos N. Garofalakis, Joseph M. Hell...
NIPS
2004
15 years 1 months ago
Validity Estimates for Loopy Belief Propagation on Binary Real-world Networks
We introduce a computationally efficient method to estimate the validity of the BP method as a function of graph topology, the connectivity strength, frustration and network size....
Joris M. Mooij, Hilbert J. Kappen