Computation

Results: 6765



#Item
11Automated Deduction for Verification Natarajan Shankar SRI International Automated deduction uses computation to perform symbolic logical reasoning. It has been a core technology for program verification from the very be

Automated Deduction for Verification Natarajan Shankar SRI International Automated deduction uses computation to perform symbolic logical reasoning. It has been a core technology for program verification from the very be

Add to Reading List

Source URL: dream.inf.ed.ac.uk

Language: English - Date: 2010-07-20 03:24:48
12Four Round Secure Computation without Setup Zvika Brakerski1,? and Shai Halevi2,?? and Antigoni Polychroniadou3,? ? ? 1 Weizmann Institute of Science

Four Round Secure Computation without Setup Zvika Brakerski1,? and Shai Halevi2,?? and Antigoni Polychroniadou3,? ? ? 1 Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-10 16:45:59
13Abstract  The Theory and Practice of Causal Commutative Arrows Hai Liu 2011 Arrows are a popular form of abstract computation. Being more general than

Abstract The Theory and Practice of Causal Commutative Arrows Hai Liu 2011 Arrows are a popular form of abstract computation. Being more general than

Add to Reading List

Source URL: thev.net

Language: English - Date: 2014-02-12 14:21:02
14MATHEMATICS OF COMPUTATION Volume 81, Number 279, July 2012, Pages 1487–1511 SArticle electronically published on February 17, 2012  PERTURBATION ANALYSIS OF THE QR FACTOR R

MATHEMATICS OF COMPUTATION Volume 81, Number 279, July 2012, Pages 1487–1511 SArticle electronically published on February 17, 2012 PERTURBATION ANALYSIS OF THE QR FACTOR R

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2017-06-27 04:39:37
15Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2014-12-14 14:47:16
16Zexe: Enabling Decentralized Private Computation Sean Bowe Alessandro Chiesa  Matthew Green

Zexe: Enabling Decentralized Private Computation Sean Bowe Alessandro Chiesa Matthew Green

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-10-08 23:34:55
17A Projective Geometry Architecture for Scientific Computation Bharadwaj S . Amrutur Rajeev Joshi  Narendra K. Karmarkar

A Projective Geometry Architecture for Scientific Computation Bharadwaj S . Amrutur Rajeev Joshi Narendra K. Karmarkar

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 20:40:57
18Session A1: Multi-Party Computation 1  CCS’17, October 30-November 3, 2017, Dallas, TX, USA Global-Scale Secure Multiparty Computation Xiao Wang

Session A1: Multi-Party Computation 1 CCS’17, October 30-November 3, 2017, Dallas, TX, USA Global-Scale Secure Multiparty Computation Xiao Wang

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
    19Resolving the conflict between generality and plausibility in verified computation Srinath Setty? , Benjamin Braun? , Victor Vu? , Andrew J. Blumberg? , Bryan Parno† , and Michael Walfish? ? The University of Texas at

    Resolving the conflict between generality and plausibility in verified computation Srinath Setty? , Benjamin Braun? , Victor Vu? , Andrew J. Blumberg? , Bryan Parno† , and Michael Walfish? ? The University of Texas at

    Add to Reading List

    Source URL: www.pepper-project.org

    Language: English - Date: 2017-11-11 14:59:54
    20Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

    Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-06-09 02:13:24