Sciweavers

588 search results - page 81 / 118
» Building the Community
Sort
View
CIKM
2009
Springer
14 years 2 months ago
Applying differential privacy to search queries in a policy based interactive framework
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Palanivel Balaji Kodeswaran, Evelyne Viegas
ECTEL
2009
Springer
14 years 2 months ago
Phantom Tasks and Invisible Rubric: The Challenges of Remixing Learning Objects in the Wild
Learning Objects are atomic packages of learning content with associated activities that can be reused in different contexts. However traditional Learning Objects can be complex an...
David E. Millard, Yvonne Margaret Howard, Patrick ...
SOUPS
2009
ACM
14 years 2 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
ICRA
2008
IEEE
156views Robotics» more  ICRA 2008»
14 years 2 months ago
How to learn accurate grid maps with a humanoid
Abstract— Humanoids have recently become a popular research platform in the robotics community. Such robots offer various fields for new applications. However, they have several...
Cyrill Stachniss, Maren Bennewitz, Giorgio Grisett...
CSFW
2007
IEEE
14 years 1 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter