Sciweavers

3608 search results - page 126 / 722
» computer 2011
Sort
View
116
Voted
IJKESDP
2011
107views more  IJKESDP 2011»
14 years 7 months ago
Creating singing vocal expressions by means of interactive evolutionary computation
—Today, researches for singing by computer have attracted attention. VOCALOID1 is an application to realize that aim. By inputing lyrics and melody, users can make songs sung by ...
Akio Watanabe, Hitoshi Iba
122
Voted
IACR
2011
97views more  IACR 2011»
14 years 3 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
134
Voted
IACR
2011
104views more  IACR 2011»
14 years 3 months ago
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
Protocols for generic secure multi-party computation (MPC) come in two forms: they either represent the function being computed as a boolean circuit, or as an arithmetic circuit o...
Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, ...
139
Voted
ENTCS
2011
106views more  ENTCS 2011»
14 years 10 months ago
A Flexible Framework for Visualisation of Computational Properties of General Explicit Substitutions Calculi
SUBSEXPL is a system originally developed to visualise reductions, simplifications and normalisations in three important calculi of explicit substitutions and has been applied to...
F. L. C. de Moura, A. V. Barbosa, Mauricio Ayala-R...
164
Voted
TKDE
2011
176views more  TKDE 2011»
14 years 10 months ago
Experience Transfer for the Configuration Tuning in Large-Scale Computing Systems
—This paper proposes a new strategy, the experience transfer, to facilitate the management of large-scale computing systems. It deals with the utilization of management experienc...
Haifeng Chen, Wenxuan Zhang, Guofei Jiang