Sciweavers

1487 search results - page 68 / 298
» The Computational Complexity of Link Building
Sort
View
TRUST
2009
Springer
15 years 8 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
SBBD
2004
119views Database» more  SBBD 2004»
15 years 2 months ago
Computing the Dependency Basis for Nested List Attributes
Multi-valued dependencies (MVDs) are an important class of constraints that is fundamental for relational database design. Although modern applications increasingly require the su...
Sven Hartmann, Sebastian Link
SPAA
2005
ACM
15 years 7 months ago
Fast construction of overlay networks
An asynchronous algorithm is described for rapidly constructing an overlay network in a peer-to-peer system where all nodes can in principle communicate with each other directly t...
Dana Angluin, James Aspnes, Jiang Chen, Yinghua Wu...
TOG
2002
112views more  TOG 2002»
15 years 1 months ago
Creating models of truss structures with optimization
We present a method for designing truss structures, a common and complex category of buildings, using non-linear optimization. Truss structures are ubiquitous in the industrialize...
Jeffrey Smith, Jessica K. Hodgins, Irving Oppenhei...
ASIACRYPT
2005
Springer
15 years 7 months ago
Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes
Abstract. As an extension of multi-party computation (MPC), we propose the concept of secure parallel multi-party computation which is to securely compute multi-functions against a...
Zhifang Zhang, Mulan Liu, Liangliang Xiao