Sciweavers

166 search results - page 15 / 34
» Activate This Classroom at Time Now
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
GECCO
2007
Springer
437views Optimization» more  GECCO 2007»
14 years 2 months ago
A gestalt genetic algorithm: less details for better search
The basic idea to defend in this paper is that an adequate perception of the search space, sacrificing most of the precision, can paradoxically accelerate the discovery of the mo...
Christophe Philemotte, Hugues Bersini
WWW
2007
ACM
14 years 8 months ago
Dynamic personalized pagerank in entity-relation graphs
Extractors and taggers turn unstructured text into entityrelation (ER) graphs where nodes are entities (email, paper, person, conference, company) and edges are relations (wrote, ...
Soumen Chakrabarti
IFIP
1993
Springer
13 years 12 months ago
Computer Science in Elementary and Secondary Schools
In this paper we examine the current computer science curriculum in elementary schools and identify its shortcomings. We then presents a new approach to teaching computer science ...
Viera K. Proulx
FLAIRS
2007
13 years 10 months ago
Introductory AI for Both Computer Science and Neuroscience Students
Macalester College offers a single undergraduate elective in artificial intelligence. This course is cross-listed between Computer Science and Cognitive and Neuroscience Studies,...
Susan Eileen Fox