Sciweavers

31686 search results - page 6316 / 6338
» Resource typing in Guru
Sort
View
IACR
2011
128views more  IACR 2011»
14 years 2 days ago
Sign Modules in Secure Arithmetic Circuits
In this paper, we study the complexity of secure multiparty computation using only the secure arithmetic black-box of a finite field, counting the cost by the number of secure m...
Ching-Hua Yu
99
Voted
IACR
2011
86views more  IACR 2011»
14 years 2 days ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
117
Voted
ICDCS
2011
IEEE
14 years 1 days ago
Starlink: Runtime Interoperability between Heterogeneous Middleware Protocols
—Interoperability remains a challenging and growing problem within distributed systems. A range of heterogeneous network and middleware protocols which cannot interact with one a...
Yérom-David Bromberg, Paul Grace, Laurent R...
AVI
2010
15 years 1 months ago
Advanced visual analytics interfaces
Advanced visual interfaces, like the ones found in informaualization, intend to offer a view on abstract data spaces to enable users to make sense of them. By mapping data to visu...
Daniel A. Keim, Peter Bak, Enrico Bertini, Daniela...
143
Voted
AAMAS
2012
Springer
13 years 8 months ago
Using argumentation to model agent decision making in economic experiments
In this paper we demonstrate how a qualitative framework for decision making can be used to model scenarios from experimental economic studies and we show how our approach explains...
Trevor J. M. Bench-Capon, Katie Atkinson, Peter Mc...
« Prev « First page 6316 / 6338 Last » Next »