Sciweavers

12289 search results - page 297 / 2458
» computing 2006
Sort
View
CRYPTO
2006
Springer
97views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Robust Multiparty Computation with Linear Communication Complexity
We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a polytime adversary, and allows n parties to actively secur...
Martin Hirt, Jesper Buus Nielsen
ASSETS
2006
ACM
15 years 10 months ago
Accessibility now!: teaching accessible computing at the introductory level
As ASSETS attendees, we are clearly interested in promoting accessibility in computing. One way to do this is to teach courses on the topic. Most such courses are aimed at upper-l...
Brian J. Rosmaita
SMA
2006
ACM
132views Solid Modeling» more  SMA 2006»
15 years 10 months ago
Generalized penetration depth computation
— We present an efficient algorithm to compute the generalized penetration depth (PDg) between rigid models. Given two overlapping objects, our algorithm attempts to compute the...
Liangjun Zhang, Young J. Kim, Gokul Varadhan, Dine...
CCGRID
2006
IEEE
15 years 10 months ago
Policy-Based Access Control Framework for Grid Computing
Grid technology enables access and sharing of data and computational resources across administrative domains. Thus, it is important to provide a uniform access and management mech...
Jin Wu, Chokchai Leangsuksun, Vishal Rampure, Hong...
CNSR
2006
IEEE
15 years 10 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward