Search
Now showing items 131-140 of 203
A Study Of Quantum And Reversible Computing
(2013-07-31)
Integrated Scheduling For Distributed Systems
(2013-07-31)
Efficient Kernel Methods For Large Scale Classification
(2011-02-22)
Classification algorithms have been widely used in many application domains. Most of these domains deal with massive collection of data and hence demand classification algorithms that scale well with the size of the data ...
Identifying Method Memoization Opportunities in Java Programs
(2017-12-13)
Memorization of a method is a commonly used re-factoring wherein developer modules the code of a method to save return values for some or all incoming parameter values. Whenever a parameter-tuple is received for the second ...
Resolving the Complexity of Some Fundamental Problems in Computational Social Choice
(2017-12-16)
In many real world situations, especially involving multiagent systems and artificial intelligence, participating agents often need to agree upon a common alternative even if they have differing preferences over the available ...
Constructing Provably Secure Identity-Based Signature Schemes
(2018-04-03)
An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The notion was introduced by Shamir with the primary goal of simplifying ...
Construction of Secure and Efficient Private Set Intersection Protocol
(2018-03-17)
Private set intersection(PSI) is a two party protocol where both parties possess a private set and at the end of the protocol, one party (client) learns the intersection while other party (server) learns nothing. Motivated ...