Sciweavers

13457 search results - page 116 / 2692
» Can we elect if we cannot compare
Sort
View
MMMACNS
2001
Springer
14 years 1 months ago
Generalized Oblivious Transfer Protocols Based on Noisy Channels
The main cryptographic primitives (Bit Commitment (BC) and Oblivious Transfer (OT) protocols) based on noisy channels have been considered in [1] for asymptotic case. Non-asymptoti...
Valeri Korjik, Kirill Morozov
COLCOM
2008
IEEE
13 years 10 months ago
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites
Abstract. Malicious Web content poses a serious threat to the Internet, organizations and users. Current approaches to detecting malicious Web content employ high-powered honey cli...
Jiang Wang, Anup K. Ghosh, Yih Huang
FLAIRS
2004
13 years 10 months ago
Augmenting AI Coursework Through Undergraduate Research
All courses in Artificial Intelligence are not equal. The topics covered by a course entitled Artificial Intelligence vary widely. The Computing Curricula 2001: Computer Science o...
Antonio M. Lopez Jr.
ACL
2012
11 years 11 months ago
Social Event Radar: A Bilingual Context Mining and Sentiment Analysis Summarization System
Social Event Radar is a new social networking-based service platform, that aim to alert as well as monitor any merchandise flaws, food-safety related issues, unexpected eruption o...
Wen-Tai Hsieh, Chen Ming Wu, Tsun Ku, Seng-cho Tim...
DAC
1998
ACM
14 years 10 months ago
Code Compression for Embedded Systems
Memory is one of the most restricted resources in many modern embedded systems. Code compression can provide substantial savings in terms of size. In a compressed code CPU, a cach...
Haris Lekatsas, Wayne Wolf