Sciweavers

3134 search results - page 169 / 627
» simulation 2010
Sort
View
111
Voted
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
15 years 5 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
105
Voted
DATE
2010
IEEE
142views Hardware» more  DATE 2010»
15 years 5 months ago
Automatic microarchitectural pipelining
Abstract--This paper presents a method for automatic microarchitectural pipelining of systems with loops. The original specification is pipelined by performing provably-correct tra...
Marc Galceran Oms, Jordi Cortadella, Dmitry Bufist...
112
Voted
APPROX
2010
Springer
120views Algorithms» more  APPROX 2010»
15 years 5 months ago
Uniform Derandomization from Pathetic Lower Bounds
A recurring theme in the literature on derandomization is that probabilistic algorithms can be simulated quickly by deterministic algorithms, if one can obtain impressive (i.e., s...
Eric Allender, Vikraman Arvind, Fengming Wang
92
Voted
CCGRID
2010
IEEE
15 years 4 months ago
Topology Aggregation for E-science Networks
Abstract--We propose several algorithms for topology aggregation (TA) to effectively summarize large-scale networks. These TA techniques are shown to significantly better for path ...
Eun-Sung Jung, Sanjay Ranka, Sartaj Sahni
124
Voted
CCS
2010
ACM
15 years 3 months ago
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in p...
Gilles Barthe, Marion Daubignard, Bruce M. Kapron,...