Learn More
This paper investigates one-round secure computation between two distrusting parties: Alice and Bob each have private inputs to a common function, but only Alice, acting as the receiver, is to learn the output; the protocol is limited to one message from Alice to Bob followed by one message from Bob to Alice. A model in which Bob may be compu-tationally(More)
We present an anisotropic adaptive discretization method and demonstrate how computational efficiency can be increased when applying it to the simulation of cardiovascular flow. We further propose a new adaptive approach which controls the mesh adaptation procedure to maintain structured and graded elements near the wall resulting in a more accurate wall(More)
  • 1