Computation

Results: 6765



#Item
31

Reachability Computation for Switching Diffusions: Finite Abstractions with Certifiable and Tuneable Precision Alessandro Abate Luca Bortolussi

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2017-01-31 07:04:26
    32Theoretical computer science / Logic in computer science / Computational complexity theory / Formal methods / Mathematics / Electronic design automation / NP-complete problems / Constraint programming / Satisfiability modulo theories / Boolean satisfiability problem / Solver / Model checking

    SC2 challenges: when Satisfiability Checking and Symbolic Computation join forces ´ Erika Abrah´ am1 , John Abbott10 , Bernd Becker2 , Anna M. Bigatti3 , Martin Brain9 , Alessandro Cimatti4 , James H. Davenport5 ,

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-07-30 15:11:06
    33Logic gates / Cryptographic protocols / Circuit complexity / Theoretical computer science / Complexity classes / Garbled circuit / Theory of computation / Secure multi-party computation / Multiplexer / XOR gate / OR gate / NC

    Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries

    Add to Reading List

    Source URL: acmccs.github.io

    Language: English - Date: 2017-12-30 21:51:59
    34Quantum mechanics / Physics / Theoretical computer science / Quantum information science / Quantum computing / Quantum states / Quantum algorithms / Qubit / Quantum superposition / Hadamard transform / Quantum entanglement / Matrix

    CPSC: Quantum Computation John Watrous, University of Calgary Lecture 1: Overview of quantum information January 10, 2006

    Add to Reading List

    Source URL: cs.uwaterloo.ca

    Language: English - Date: 2017-09-07 13:00:10
    35Cryptographic protocols / Electromagnetism / Garbled circuit / Secure multi-party computation / IP / Theory of computation / NC / Electronic circuit / Applied mathematics / Commitment scheme

    CS 294 – Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2016-03-10 13:39:26
    36Email / Cyberspace / Computing / Computer-mediated communication / Simple Mail Transfer Protocol / MIME / HTML email / Mailbox provider / Message transfer agent / Gmail / SMS / Email alias

    FLANNEL: Adding computation to electronic mail during transmission Victoria Bellotti†, Nicolas Ducheneaut†¥, Mark Howard†, Christine Neuwirth*, Ian Smith†, Trevor Smith† † ¥

    Add to Reading List

    Source URL: trevor.smith.name

    Language: English - Date: 2012-11-23 14:19:46
    37Type theory / Software engineering / Programming language theory / Computing / Scheme / System F / Type system / HindleyMilner type system / Racket / Boolean data type / Macro / Typing environment

    Higher-Order and Symbolic Computation manuscript No. (will be inserted by the editor) The Design and Implementation of Typed Scheme: From Scripts to Programs? Sam Tobin-Hochstadt · Matthias Felleisen

    Add to Reading List

    Source URL: homes.sice.indiana.edu

    Language: English - Date: 2013-08-15 14:47:07
    38Cryptography / Post-quantum cryptography / Lattice-based cryptography / Models of computation / Homeomorphisms / Homomorphic encryption / Quantum computing / Lattice / Learning with errors / RSA / One-time pad / Quantum circuit

    Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-04-10 03:50:18
    39

    A hybrid architecture for interactive verifiable computation Victor Vu, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin questions of the prover, and applies efficient tests to the

    Add to Reading List

    Source URL: www.pepper-project.org

    Language: English - Date: 2017-11-11 14:59:54
      40Cryptography / Public-key cryptography / Secret sharing / Secure multi-party computation / Cryptographic protocol / Ivan Damgrd

      Cambridge University Press3 - Secure Multiparty Computation and Secret Sharing Ronald Cramer, Ivan Bjerre Damgård and Jesper Buus Nielsen Table of Contents More information

      Add to Reading List

      Source URL: users-cs.au.dk

      Language: English - Date: 2016-04-21 06:42:55
      UPDATE