Sciweavers

886 search results - page 56 / 178
» Generalized Bezout Identity
Sort
View
WWW
2007
ACM
14 years 10 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins
CHI
2010
ACM
14 years 4 months ago
Homeless young people's experiences with information systems: life and work in a community technology center
This paper explores how homeless young people, aged 1325, make use of information systems in daily life. Observed in a community technology center, four different examples of uses...
Jill Palzkill Woelfer, David G. Hendry
SI3D
2010
ACM
14 years 4 months ago
Synthesis and editing of personalized stylistic human motion
This paper presents a generative human motion model for synthesis, retargeting, and editing of personalized human motion styles. We first record a human motion database from mult...
Jianyuan Min, Huajun Liu, Jinxiang Chai
CPM
2009
Springer
189views Combinatorics» more  CPM 2009»
14 years 3 months ago
Average-Case Analysis of Perfect Sorting by Reversals
A sequence of reversals that takes a signed permutation to the identity is perfect if it preserves all common intervals between the permutation and the identity. The problem of com...
Mathilde Bouvel, Cedric Chauve, Marni Mishna, Domi...
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
14 years 3 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...