-
3
-
-
84958035648
-
Secure multi-party computational geometry
-
Providence, Rhode Island, USA, August 8-10
-
M. J. Atallah and W. Du. Secure multi-party computational geometry. In WADS2001: 7th International Workshop on Algorithms and Data Structures, pages 165-179, Providence, Rhode Island, USA, August 8-10 2001.
-
(2001)
WADS2001: 7th International Workshop on Algorithms and Data Structures
, pp. 165-179
-
-
Atallah, M.J.1
Du, W.2
-
5
-
-
77954495907
-
-
M. Blum, R. W. Floyd, V. Pratt, R. Rivest, and R. Tarjan. Time bounds for selection, 1973.
-
(1973)
Time Bounds for Selection
-
-
Blum, M.1
Floyd, R.W.2
Pratt, V.3
Rivest, R.4
Tarjan, R.5
-
6
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
extended abstract
-
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and R. N. Wright. Selective private function evaluation with applications to private statistics (extended abstract). In Proceedings of Twentieth ACM Symposium on Principles of Distributed Computing (PODC), 2001.
-
(2001)
Proceedings of Twentieth ACM Symposium on Principles of Distributed Computing (PODC)
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
7
-
-
52449148870
-
A bitonic selection algorithm on multiprocessor system
-
G. Chen and H. Shen. A bitonic selection algorithm on multiprocessor system. J. of Comput. Sci. Technol., 4:315-322, 1989.
-
(1989)
J. of Comput. Sci. Technol.
, vol.4
, pp. 315-322
-
-
Chen, G.1
Shen, H.2
-
8
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proceedings of IEEE Symposium on Foundations of Computer Science, Milwaukee, WI USA, October 23-25 1995.
-
Proceedings of IEEE Symposium on Foundations of Computer Science, Milwaukee, WI USA, October 23-25 1995
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
10
-
-
0004116989
-
-
The MIT Press
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms, Second Edition. The MIT Press, 2001.
-
(2001)
Introduction to Algorithms, Second Edition
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
11
-
-
77954523219
-
Secure multiparty computation of approximations
-
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. Wright. Secure multiparty computation of approximations. In Twenty Eighth International Colloquium on Automata, Language and Programming, 2001.
-
Twenty Eighth International Colloquium on Automata, Language and Programming, 2001
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.6
-
12
-
-
0033350255
-
Cache-oblivious algorithms
-
extended abstract. IEEE Computer Society Press
-
M. Frigo, C. E. Leiserson, H. Prokop, and S. Ramachandran. Cache-oblivious algorithms (extended abstract). In In Proc. 40th Annual Symposium on Foundations of Computer Science, pages 285-397. IEEE Computer Society Press, 1999.
-
(1999)
Proc. 40th Annual Symposium on Foundations of Computer Science
, pp. 285-397
-
-
Frigo, M.1
Leiserson, C.E.2
Prokop, H.3
Ramachandran, S.4
-
22
-
-
0029182282
-
On probabilistic networks for selection, merging, and sorting
-
Santa Barbara, CA, USA
-
T. Leighton, Y. Ma, and T. Suel. On probabilistic networks for selection, merging, and sorting. In SPAA'95, pages 106-118, Santa Barbara, CA, USA, 1995.
-
(1995)
SPAA'95
, pp. 106-118
-
-
Leighton, T.1
Ma, Y.2
Suel, T.3
-
23
-
-
70449494057
-
The performance of randomized shellsort-like network sorting algorithms
-
Institute for Defense Analysis, Princeton, NJ, USA
-
P. Lemke. The performance of randomized shellsort-like network sorting algorithms. In SCAMP working paper, Institute for Defense Analysis, Princeton, NJ, USA, 1994.
-
(1994)
SCAMP Working Paper
-
-
Lemke, P.1
-
24
-
-
84974555530
-
Privacy preserving data mining
-
Advances in Cryptology - Crypto2000
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology - Crypto2000, Lecture Notes in Computer Science, volume 1880, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
-
-
Lindell, Y.1
Pinkas, B.2
-
25
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - a secure two-party computation system. In In USENIX Security Symposium, pages 287-302, 2004.
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
26
-
-
0025225222
-
Improved sorting networks with o(log n) depth
-
M. S. Paterson. Improved sorting networks with o(log n) depth. Algorithmica, 5:75-92, 2005.
-
(2005)
Algorithmica
, vol.5
, pp. 75-92
-
-
Paterson, M.S.1
-
29
-
-
84914724052
-
A high-speed sorting procedure
-
D. L. Shell. A high-speed sorting procedure. Commun. ACM, 2(7):30-32, 1959.
-
(1959)
Commun. ACM
, vol.2
, Issue.7
, pp. 30-32
-
-
Shell, D.L.1
|