Sciweavers

2601 search results - page 440 / 521
» A Point in Many Triangles
Sort
View
WWW
2009
ACM
16 years 5 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
WWW
2004
ACM
16 years 5 months ago
Schemapath, a minimal extension to xml schema for conditional constraints
In the past few years, a number of constraint languages for XML documents has been proposed. They are cumulatively called schema languages or validation languages and they compris...
Claudio Sacerdoti Coen, Paolo Marinelli, Fabio Vit...
132
Voted
STOC
2009
ACM
187views Algorithms» more  STOC 2009»
16 years 5 months ago
Artin automorphisms, cyclotomic function fields, and folded list-decodable codes
Algebraic codes that achieve list decoding capacity were recently constructed by a careful "folding" of the Reed-Solomon code. The "low-degree" nature of this f...
Venkatesan Guruswami
DCC
2009
IEEE
16 years 5 months ago
Compressed Kernel Perceptrons
Kernel machines are a popular class of machine learning algorithms that achieve state of the art accuracies on many real-life classification problems. Kernel perceptrons are among...
Slobodan Vucetic, Vladimir Coric, Zhuang Wang
EUROCRYPT
2009
Springer
16 years 5 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung