Sciweavers

3608 search results - page 125 / 722
» computer 2011
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
136
Voted
DSN
2011
IEEE
14 years 3 months ago
Analysis of security data from a large computing organization
In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...
123
Voted
IACR
2011
94views more  IACR 2011»
14 years 3 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
227
Voted
CPHYSICS
2011
279views Education» more  CPHYSICS 2011»
14 years 7 months ago
CAMORRA: A C++ library for recursive computation of particle scattering amplitudes
We present a new Monte Carlo tool that computes full tree-level matrix elements in high-energy physics. The program accepts user-defined models and has no restrictions on the pro...
R. Kleiss, G. van den Oord
152
Voted
CORR
2011
Springer
191views Education» more  CORR 2011»
14 years 7 months ago
Computing Optimal Coverability Costs in Priced Timed Petri Nets
—We consider timed Petri nets, i.e., unbounded Petri nets where each token carries a real-valued clock. Transition arcs are labeled with time intervals, which specify constraints...
Parosh Aziz Abdulla, Richard Mayr