Sciweavers

1021 search results - page 111 / 205
» Concepts in Proof Planning
Sort
View
EUROCRYPT
2010
Springer
14 years 1 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
CORR
2011
Springer
192views Education» more  CORR 2011»
13 years 3 months ago
Distribution-Independent Evolvability of Linear Threshold Functions
Valiant’s (2007) model of evolvability models the evolutionary process of acquiring useful functionality as a restricted form of learning from random examples. Linear threshold ...
Vitaly Feldman
MICCAI
2003
Springer
14 years 9 months ago
Tissue-Based Affine Registration of Brain Images to form a Vascular Density Atlas
Anatomic tissue atlases of the brain are widely used within the medical world and are important for identifying tissue and structural aberrations and inconsistencies within an indi...
Derek Cool, Dini Chillet, Jisung Kim, Jean-Philipp...
CHI
2009
ACM
14 years 9 months ago
Designing for families
In this Special Interest Group (SIG) we plan to focus on discussions and activities surrounding the design of technologies to support families. Many researchers and designers stud...
Carman Neustaedter, Svetlana Yarosh, A. J. Bernhei...
ICSE
2003
IEEE-ACM
14 years 9 months ago
Understanding and Predicting Effort in Software Projects
We set out to answer a question we were asked by software project management: how much effort remains to be spent on a specific software project and how will that effort be distri...
Audris Mockus, David M. Weiss, Ping Zhang