Sciweavers

9485 search results - page 120 / 1897
» Research on Brain-Like Computer
Sort
View
CORR
2010
Springer
65views Education» more  CORR 2010»
14 years 10 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
GECCO
2009
Springer
132views Optimization» more  GECCO 2009»
15 years 4 months ago
Bringing evolutionary computation to industrial applications with guide
Evolutionary Computation is an exciting research field with the power to assist researchers in the task of solving hard optimization problems (i.e., problems where the exploitabl...
Luís Da Costa, Marc Schoenauer
ICIP
2009
IEEE
15 years 11 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...

Lab
667views
15 years 7 months ago
Digital Systems and Media Computing Laboratory - DSMC
The Digital Systems and Media Computing Laboratory (DSMC Lab) was established in the end of 2002 and is located in Patras, Greece. DSMC operates under the School of Sciences and Te...
CSCW
2011
ACM
14 years 5 months ago
Technology for emerging markets at MSR india
The Technology for Emerging Markets (TEM) group at Microsoft Research India seeks to address the needs and aspirations of people in the world's developing communities. Our re...
Edward Cutrell