Sciweavers

35419 search results - page 98 / 7084
» How are we doing
Sort
View
108
Voted
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
101
Voted
MSR
2010
ACM
15 years 8 months ago
Do stack traces help developers fix bugs?
—A widely shared belief in the software engineering community is that stack traces are much sought after by developers to support them in debugging. But limited empirical evidenc...
Adrian Schröter, Nicolas Bettenburg, Rahul Pr...
129
Voted
ACMIDC
2008
15 years 5 months ago
Playing with the sound maker: do embodied metaphors help children learn?
In this paper we present the results of a comparative study that explores the potential benefits of using embodied ion to help children, aged 7 to 10, learn abstract concepts rela...
Alissa Nicole Antle, Milena Droumeva, Greg Corness
124
Voted
PST
2008
15 years 5 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
153
Voted
JAIR
2010
94views more  JAIR 2010»
15 years 2 months ago
Which Clustering Do You Want? Inducing Your Ideal Clustering with Minimal Feedback
While traditional research on text clustering has largely focused on grouping documents by topic, it is conceivable that a user may want to cluster documents along other dimension...
Sajib Dasgupta, Vincent Ng