Sciweavers

20 search results - page 4 / 4
» Fair treatment of evaluations in reviews
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ANLP
1992
137views more  ANLP 1992»
13 years 8 months ago
Compound Nouns in a Unification-Based MT System
This paper describes an approach to the treatment of nominal compounds in a machine translation project employing a modern unification-based system. General problems connected wit...
Pierrette Bouillon, Katharina Boesefeldt, Graham R...
INFSOF
1998
78views more  INFSOF 1998»
13 years 7 months ago
Program slices as an abstraction for cohesion measurement
Slices as an Abstraction for Cohesion Measurement Linda M. Ott Michigan Technological University James M. Bieman Colorado State University The basis for measuring many attributes ...
Linda M. Ott, James M. Bieman
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 7 months ago
Practical guide to controlled experiments on the web: listen to your customers not to the hippo
The web provides an unprecedented opportunity to evaluate ideas quickly using controlled experiments, also called randomized experiments (single-factor or factorial designs), A/B ...
Ron Kohavi, Randal M. Henne, Dan Sommerfield
BMCBI
2008
86views more  BMCBI 2008»
13 years 7 months ago
Predicting protein linkages in bacteria: Which method is best depends on task
Background: Applications of computational methods for predicting protein functional linkages are increasing. In recent years, several bacteria-specific methods for predicting link...
Anis Karimpour-Fard, Sonia M. Leach, Ryan T. Gill,...