Sciweavers

232 search results - page 13 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
LREC
2008
150views Education» more  LREC 2008»
13 years 11 months ago
Automatic Document Quality Control
This paper focuses on automatically improving the readability of documents. We explore mechanisms relating to content control that could be used (i) by authors to improve the qual...
Neil Newbold, Lee Gillam
AIED
2007
Springer
14 years 4 months ago
Predicting Students' Performance with SimStudent: Learning Cognitive Skills from Observation
SimStudent is a machine-learning agent that learns cognitive skills by demonstration. SimStudent was originally built as a building block for Cognitive Tutor Authoring Tools to hel...
Noboru Matsuda, William W. Cohen, Jonathan Sewall,...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
12 years 8 days ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
INFOCOM
2010
IEEE
13 years 8 months ago
INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding
—Wireless mesh networks have been widely deployed to provide broadband network access, and their performance can be significantly improved by using a new technology called netwo...
Tingting Chen, Sheng Zhong
PR
2010
135views more  PR 2010»
13 years 4 months ago
Revisiting priority queues for image analysis
Many algorithms in image analysis require a priority queue, a data structure that holds pointers to pixels in the image, and which allows efficiently finding the pixel in the queu...
Cris L. Luengo Hendriks