A review of methodological approaches for the design and optimization of wind farms

JF Herbert-Acero, O Probst, PE Réthoré, GC Larsen… - Energies, 2014 - mdpi.com
This article presents a review of the state of the art of the Wind Farm Design and
Optimization (WFDO) problem. The WFDO problem refers to a set of advanced planning …

[图书][B] Computer science handbook

AB Tucker - 2004 - taylorfrancis.com
When you think about how far and fast computer science has progressed in recent years, it's
not hard to conclude that a seven-year old handbook may fall a little short of the kind of …

[图书][B] Dynamic reconfiguration: architectures and algorithms

R Vaidyanathan, JL Trahan - 2003 - Springer
Advances in optoelectronic technologies have catapulted optical interconnects and optical
computing to the forefront, opening possibilities not previously considered in conventional …

[图书][B] Decentralization in Environmental Governance: a post-contingency approach

C Zuidema - 2016 - taylorfrancis.com
Decentralization in Environmental Governance is a critical reflection on the dangers and
risks of governance renewal; warning against one-sided criticism on traditional command …

A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design

V Kolesnikov, AR Sadeghi… - Journal of Computer …, 2013 - content.iospress.com
Abstract General two-party Secure Function Evaluation (SFE) allows mutually distrusting
parties to correctly compute any function on their private input data, without revealing the …

[图书][B] Computing handbook: computer science and software engineering

T Gonzalez, J Diaz-Herrera, A Tucker - 2014 - books.google.com
Computing Handbook, Third Edition: Computer Science and Software Engineering mirrors
the modern taxonomy of computer science and software engineering as described by the …

[图书][B] Engineering secure two-party computation protocols: design, optimization, and applications of efficient secure function evaluation

T Schneider - 2012 - books.google.com
Secure two-party computation, called secure function evaluation (SFE), enables two
mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their …

[PDF][PDF] Practical Secure Function Evaluation.

T Schneider - Informatiktage, 2008 - download.hrz.tu-darmstadt.de
This thesis focuses on practical aspects of general two-party Secure Function Evaluation
(SFE). We give a new SFE protocol that allows free evaluation of XOR gates and is provably …

From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design

V Kolesnikov, AR Sadeghi, T Schneider - Cryptology ePrint Archive, 2010 - eprint.iacr.org
Abstract General two-party Secure Function Evaluation (SFE) allows mutually distrusting
parties to (jointly) correctly compute\emph {any} function on their private input data, without …

Fine hierarchies and m-reducibilities in theoretical computer science

VL Selivanov - Theoretical Computer Science, 2008 - Elsevier
This is a survey of results about versions of fine hierarchies and many-one reducibilities that
appear in different parts of theoretical computer science. These notions and related …