-
1
-
-
77954694081
-
Secure supply-chain protocols
-
Newport Beach, CA, June 24-27
-
M.J. Atallah, V. Deshpande, H.G. Elmongui and L.B. Schwarz, Secure supply-chain protocols, in: Proceedings of the 2003 IEEE International Conference on E-Commerce, Newport Beach, CA, June 24-27, 2003, pp. 293-302.
-
(2003)
Proceedings of the 2003 IEEE International Conference on E-Commerce
, pp. 293-302
-
-
Atallah, M.J.1
Deshpande, V.2
Elmongui, H.G.3
Schwarz, L.B.4
-
2
-
-
0002591736
-
Local optimization of global objectives: Competitive distributed deadlock resolution and resource allocation
-
B. Awerbuch and Y. Azar, Local optimization of global objectives: competitive distributed deadlock resolution and resource allocation, in: Proc. IEEE Symposium on Foundations of Computer Science, 1994, pp. 240-249.
-
(1994)
Proc. IEEE Symposium on Foundations of Computer Science
, pp. 240-249
-
-
Awerbuch, B.1
Azar, Y.2
-
3
-
-
11144283310
-
Fast, distributed approximation algorithms for positive linear programming with applications to flow control
-
DOI 10.1137/S0097539700379383
-
Y. Bartal, J.W. Byers and D. Raz, Fast, distributed approximation algorithms for positive linear programming with applications to flow control, SIAM J. Comput. 33(6) (2004), 1261-1279. (Pubitemid 40026766)
-
(2004)
SIAM Journal on Computing
, vol.33
, Issue.6
, pp. 1261-1279
-
-
Bartal, Y.1
Byers, J.W.2
Raz, D.3
-
4
-
-
74049112591
-
Hiccups on the road to privacy-preserving linear programming
-
ACM, New York, NY, USA
-
A. Bednarz, N. Bean and M. Roughan, Hiccups on the road to privacy-preserving linear programming, in: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, ACM, New York, NY, USA, 2009, pp. 117-120.
-
(2009)
Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society
, pp. 117-120
-
-
Bednarz, A.1
Bean, N.2
Roughan, M.3
-
5
-
-
78049400032
-
Secure multiparty linear programming using fixed-point arithmetic
-
O. Catrina and S. de Hoogh, Secure multiparty linear programming using fixed-point arithmetic, in: ESORICS, 2010, pp. 134-150.
-
(2010)
ESORICS
, pp. 134-150
-
-
Catrina, O.1
De Hoogh, S.2
-
6
-
-
61349161743
-
An approach to identifying beneficial collaboration securely in decentralized logistics systems
-
C. Clifton, A. Iyer, R. Cho, W. Jiang, M. Kantarcioglu and J. Vaidya, An approach to identifying beneficial collaboration securely in decentralized logistics systems, Manufacturing & Service Operations Management 10(1) (2008), 108-125.
-
(2008)
Manufacturing & Service Operations Management
, vol.10
, Issue.1
, pp. 108-125
-
-
Clifton, C.1
Iyer, A.2
Cho, R.3
Jiang, W.4
Kantarcioglu, M.5
Vaidya, J.6
-
7
-
-
0003909736
-
-
Princeton Univ. Press, Princeton, NJ, USA
-
G. Dantzig, Linear Programming and Extensions, Princeton Univ. Press, Princeton, NJ, USA, 1963.
-
(1963)
Linear Programming and Extensions
-
-
Dantzig, G.1
-
9
-
-
0242697123
-
-
PhD thesis, Purdue University, West Lafayette, IN, USA
-
W. Du, A study of several specific secure two-party computation problems, PhD thesis, Purdue University, West Lafayette, IN, USA, 2001.
-
(2001)
A Study of Several Specific Secure Two-party Computation Problems
-
-
Du, W.1
-
11
-
-
33846895150
-
The rank of a random matrix
-
DOI 10.1016/j.amc.2006.07.076, PII S0096300306009040
-
X. Feng and Z. Zhang, The rank of a random matrix, Appl. Math. Comput. 185(1) (2007), 689-694. (Pubitemid 46241400)
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.1
, pp. 689-694
-
-
Feng, X.1
Zhang, Z.2
-
13
-
-
84883928352
-
-
Princeton Univ. Press, Princeton, NJ, USA
-
H. Gintis, Game Theory Evolving: A Problem-Centered Introduction to Modeling Strategic Interaction, Princeton Univ. Press, Princeton, NJ, USA, 2009.
-
(2009)
Game Theory Evolving: A Problem-Centered Introduction to Modeling Strategic Interaction
-
-
Gintis, H.1
-
15
-
-
0023545076
-
Completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali and A. Wigderson, How to play any mental game-a completeness theorem for protocols with honest majority, in: Proceedings of the 19th ACM Symposium on the Theory of Computing, ACM, New York, NY, USA, 1987, pp. 218-229. (Pubitemid 18643409)
-
(1987)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich Oded1
Micali Silvio2
Wigderson Avi3
-
16
-
-
79960248419
-
Efficient distributed linear programming with limited disclosure
-
Y. Hong, J. Vaidya and H. Lu, Efficient distributed linear programming with limited disclosure, in: DBSec, 2011, pp. 170-185.
-
(2011)
DBSec
, pp. 170-185
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
-
17
-
-
84856161025
-
Privacy-preserving tabu search for distributed graph coloring
-
Y. Hong, J. Vaidya, H. Lu and B. Shafiq, Privacy-preserving tabu search for distributed graph coloring, in: SocialCom/PASSAT, 2011, pp. 951-958.
-
(2011)
SocialCom/PASSAT
, pp. 951-958
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Shafiq, B.4
-
18
-
-
26444479778
-
Optimization by simulated annealing
-
S. Kirkpatrick, C.D. Gelatt and M.P. Vecchi, Optimization by simulated annealing, Science 220(4598) (1983), 671-680.
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt, C.D.2
Vecchi, M.P.3
-
20
-
-
84872266260
-
Privacy-preserving Horizontally Partitioned Linear Programs with Inequality Constraints
-
DOI: 10.1007/s11590-011-0403-2
-
W. Li, H. Li and C. Deng, Privacy-preserving horizontally partitioned linear programs with inequality constraints, Optim. Lett. (2011), DOI: 10.1007/s11590-011-0403-2.
-
(2011)
Optim. Lett.
-
-
Li, W.1
Li, H.2
Deng, C.3
-
21
-
-
4544306842
-
Solving distributed constraint optimization problems using cooperative mediation
-
IEEE Computer Society, Los Alamitos, CA, USA
-
R. Mailler and V. Lesser, Solving distributed constraint optimization problems using cooperative mediation, in: Proceedings of 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, IEEE Computer Society, Los Alamitos, CA, USA, 2004, pp. 438-445.
-
(2004)
Proceedings of 3rd International Joint Conference on Autonomous Agents and Multiagent Systems
, pp. 438-445
-
-
Mailler, R.1
Lesser, V.2
-
22
-
-
78650750065
-
Privacy-preserving Linear Programming
-
O.L. Mangasarian, Privacy-preserving linear programming, Optim. Lett. 5(1) (2011), 165-172.
-
(2011)
Optim. Lett.
, vol.5
, Issue.1
, pp. 165-172
-
-
Mangasarian, O.L.1
-
23
-
-
84857650296
-
Privacy-preserving Horizontally Partitioned Linear Programs
-
O.L. Mangasarian, Privacy-preserving horizontally partitioned linear programs, Optim. Lett. 6(3) (2012), 431-436.
-
(2012)
Optim. Lett.
, vol.6
, Issue.3
, pp. 431-436
-
-
Mangasarian, O.L.1
-
24
-
-
1142305185
-
An asynchronous complete method for distributed constraint optimization
-
ACM Press, New York, NY, USA
-
P.J. Modi, W.-M. Shen, M. Tambe and M. Yokoo, An asynchronous complete method for distributed constraint optimization, in: Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, ACM Press, New York, NY, USA, 2003, pp. 161-168.
-
(2003)
Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems
, pp. 161-168
-
-
Modi, P.J.1
Shen, W.-M.2
Tambe, M.3
Yokoo, M.4
-
25
-
-
85101463362
-
-
Wiley, New York, NY, USA
-
G.L. Nemhauser and L.A. Wolsey, Integer and Combinatorial Optimization, Wiley, New York, NY, USA, 1988.
-
(1988)
Integer and Combinatorial Optimization
-
-
Nemhauser, G.L.1
Wolsey, L.A.2
-
26
-
-
0003725604
-
-
Prentice-Hall, Upper Saddle River, NJ, USA
-
C.H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and Complexity, Prentice-Hall, Upper Saddle River, NJ, USA, 1982.
-
(1982)
Combinatorial Optimization: Algorithms and Complexity
-
-
Papadimitriou, C.H.1
Steiglitz, K.2
-
27
-
-
49249117590
-
On the value of information in distributed decision-making (extended abstract)
-
ACM Press, New York, NY, USA
-
C.H. Papadimitriou and M. Yannakakis, On the value of information in distributed decision-making (extended abstract), in: Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing, ACM Press, New York, NY, USA, 1991, pp. 61-64.
-
(1991)
Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing
, pp. 61-64
-
-
Papadimitriou, C.H.1
Yannakakis, M.2
-
28
-
-
0027308414
-
Linear programming without the matrix
-
ACM Press, New York, NY, USA
-
C.H. Papadimitriou and M. Yannakakis, Linear programming without the matrix, in: Proceedings of the 25th Annual ACM Symposium on Theory of Computing, ACM Press, New York, NY, USA, 1993, pp. 121-129.
-
(1993)
Proceedings of the 25th Annual ACM Symposium on Theory of Computing
, pp. 121-129
-
-
Papadimitriou, C.H.1
Yannakakis, M.2
-
30
-
-
29344456460
-
Superstabilizing, fault-containing distributed combinatorial optimization
-
Proceedings of the 20th National Conference on Artificial Intelligence and the 17th Innovative Applications of Artificial Intelligence Conference, AAAI-05/IAAI-05
-
A. Petcu and B. Faltings, Superstabilizing, fault-containing multiagent combinatorial optimization, in: Proceedings of the National Conference on Artificial Intelligence, 2005, pp. 449-454. (Pubitemid 43006816)
-
(2005)
Proceedings of the National Conference on Artificial Intelligence
, vol.1
, pp. 449-454
-
-
Petcu, A.1
Faltings, B.2
-
33
-
-
84864569795
-
Secure combinatorial optimization simulating DFS tree-based variable elimination
-
Ft. Lauderdale, FL, USA, January
-
M.-C. Silaghi, B. Faltings and A. Petcu, Secure combinatorial optimization simulating DFS tree-based variable elimination, in: Proc. 9th Symposium on Artificial Intelligence and Mathematics, Ft. Lauderdale, FL, USA, January 2006, available at: http://www2.cs.fit.edu/msilaghi/papers/.
-
(2006)
Proc. 9th Symposium on Artificial Intelligence and Mathematics
-
-
Silaghi, M.-C.1
Faltings, B.2
Petcu, A.3
-
36
-
-
35248879821
-
Secure generalized Vickrey auction using homomorphic encryption
-
Springer, Heidelberg
-
K. Suzuki and M. Yokoo, Secure generalized Vickrey auction using homomorphic encryption, in: Proceedings of the 7th Annual Conference on Financial Cryptography, Lecture Notes in Computer Science, Vol. 2742, Springer, Heidelberg, 2003, pp. 239-249.
-
(2003)
Proceedings of the 7th Annual Conference on Financial Cryptography, Lecture Notes in Computer Science
, vol.2742
, pp. 239-249
-
-
Suzuki, K.1
Yokoo, M.2
-
38
-
-
0003497109
-
-
3rd edn, Wiley, New York, NY, USA
-
E. Turban, R.K. Rainer and R.E. Potter, Introduction to Information Technology, 3rd edn, Wiley, New York, NY, USA, 2005.
-
(2005)
Introduction to Information Technology
-
-
Turban, E.1
Rainer, R.K.2
Potter, R.E.3
-
39
-
-
69249243704
-
Privacy-preserving linear programming
-
J. Vaidya, Privacy-preserving linear programming, in: SAC, 2009, pp. 2002-2007.
-
(2009)
SAC
, pp. 2002-2007
-
-
Vaidya, J.1
-
41
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society, Los Alamitos, CA, USA
-
A.C. Yao, How to generate and exchange secrets, in: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, IEEE Computer Society, Los Alamitos, CA, USA, 1986, pp. 162-167.
-
(1986)
Proceedings of the 27th IEEE Symposium on Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.1
-
42
-
-
85043435920
-
Distributed constraint satisfaction for formalizing distributed problem solving
-
M. Yokoo, E.H. Durfee, T. Ishida and K. Kuwabar, Distributed constraint satisfaction for formalizing distributed problem solving, in: Proceedings of International Conference on Distributed Computing Systems, 1992, pp. 614-621.
-
(1992)
Proceedings of International Conference on Distributed Computing Systems
, pp. 614-621
-
-
Yokoo, M.1
Durfee, E.H.2
Ishida, T.3
Kuwabar, K.4
-
43
-
-
0002818660
-
Distributed breakout algorithm for solving distributed constraint satisfaction problems
-
V. Lesser, ed., MIT Press, Cambridge, MA, USA
-
M. Yokoo and K. Hirayama, Distributed breakout algorithm for solving distributed constraint satisfaction problems, in: Proceedings of the 1st International Conference on Multi-Agent Systems, V. Lesser, ed., MIT Press, Cambridge, MA, USA, 1995, p. 467.
-
(1995)
Proceedings of the 1st International Conference on Multi-Agent Systems
, pp. 467
-
-
Yokoo, M.1
Hirayama, K.2
-
44
-
-
84957005324
-
Secure distributed constraint satisfaction: Reaching agreement without revealing private information
-
Springer-Verlag, London, UK
-
M. Yokoo, K. Suzuki and K. Hirayama, Secure distributed constraint satisfaction: reaching agreement without revealing private information, in: Proceedings of the 8th International Conference on Principles and Practice of Constraint Programming, Springer-Verlag, London, UK, 2002, pp. 387-401.
-
(2002)
Proceedings of the 8th International Conference on Principles and Practice of Constraint Programming
, pp. 387-401
-
-
Yokoo, M.1
Suzuki, K.2
Hirayama, K.3
|