Computer Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 2444
TitleAuthor(s)Issue DateViews
Modeling Long-Range Traveling Times with Big Railway Data
Proceeding/Conference:International Conference on Database Systems for Advanced Applications (DASFAA)
2022
9
NASPipe: high performance and reproducible pipeline parallel supernet training via causal synchronous parallelism
Proceeding/Conference:Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2022)
2022
8
 
Achieving low tail-latency and high scalability for serializable transactions in edge computing
Proceeding/Conference:Proceedings of the Sixteenth European Conference on Computer Systems (EuroSys '21)
2021
3
 
Applications of Bayesian Optimization in Natural Language Processing
Proceeding/Conference:Genetic and Evolutionary Computation Conference (GECCO-2021)
2021
3
 
Learning Neural Character Controllers from  Motion Capture Data
Proceeding/Conference:The 13th International Conference on Advanced Computer Science and Information Systems (ICACSIS) 2021 & The 6th International Workshop on Big Data and Information Security (IWBIS)
2021
11
 
Learning Neural Character Controllers from Videos and Motion Capture Data
Proceeding/Conference:The 15th Conference on Quality Control by Artificial Vision (QCAV2021)
2021
12
 
Neural Character Controllers for Character-Object and Character-Character Interactions
Proceeding/Conference:The 33rd International Conference on Computer Animation and Social Agents (CASA 2020)
2020
12
Neural Machine Translation with Bilingual History Involved Attention
Proceeding/Conference:Natural Language Processing and Chinese Computing: 8th CCF International Conference, NLPCC 2019, Dunhuang, China, October 9–14, 2019, Proceedings, Part II
2019
9
Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting
Proceeding/Conference:Cryptology and Network Security: 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings
2019
8
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism
Proceeding/Conference:Advances in Cryptology - ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II
2018
6
Preprocess-then-NTT technique and its applications to kyber and newhope
Proceeding/Conference:Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised Selected Papers
2019
7
Lattice-based dual receiver encryption and more
Proceeding/Conference:Information Security and Privacy : 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018, Proceedings
2018
6
Towards tightly secure deterministic public key encryption
Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
2018
5
Regularly lossy functions and applications
Proceeding/Conference:Topics in Cryptology - CT-RSA 2018 : The Cryptographers’ Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings
2018
5
Compact hierarchical IBE from lattices in the standard model
Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings
2018
5
New framework of password-based authenticated key exchange from only-one lossy encryption
Proceeding/Conference:Provable Security : 11th International Conference, ProvSec 2017, Xi’an, China, October 23–25, 2017, Proceedings
2017
5
IND-PCA secure KEM is enough for password-based authenticated key exchange
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
5
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus
Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016
2
Lossy projective hashing and its applications
Proceeding/Conference:Progress in Cryptology - INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
2015
6
Identity-based lossy encryption from learning with errors
Proceeding/Conference:Advances in Information and Computer Security, 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26–28, 2015, Proceedings
2015
3
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 2444