Sciweavers

1209 search results - page 118 / 242
» Universal Algebra and Computer Science
Sort
View
AI
2011
Springer
14 years 10 months ago
Instantiating abstract argumentation with classical logic arguments: Postulates and properties
ating Abstract Argumentation with Classical Logic Arguments: Postulates and Properties Nikos Gorogiannisa , Anthony Hunterb,∗ aDepartment of Computer Science, Queen Mary, Univers...
Nikos Gorogiannis, Anthony Hunter
IACR
2011
105views more  IACR 2011»
14 years 2 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
137
Voted
SIGGRAPH
2009
ACM
15 years 9 months ago
Educating technophile artists: experiences from a highly successful computer animation undergraduate programme
Over the past few decades, the arts have become increasingly dependent on and influenced by the development of computer technology. In the 1960s pioneering artists experimented w...
Peter Comninos, Leigh McLoughlin, Eike Falk Anders...
LISA
1994
15 years 4 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
15 years 6 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...