Sciweavers

4702 search results - page 11 / 941
» How to Copyright a Function
Sort
View
PSYCHNOLOGY
2007
112views more  PSYCHNOLOGY 2007»
13 years 9 months ago
Extended Television: A Study of How Investigations of Use Can Inform Design Processes in Nursing Homes
This paper describes the shortcomings in the support that replaces the lost distributed cognition in older people who move to nursing homes and how artifacts can improve this by f...
Peter Abdelmassih Waller
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri
CORR
2012
Springer
177views Education» more  CORR 2012»
12 years 5 months ago
Evolution of public cooperation on interdependent networks: The impact of biased utility functions
– We study the evolution of public cooperation on two interdependent networks that are connected by means of a utility function, which determines to what extent payoffs in one n...
Zhen Wang, Attila Szolnoki, Matjaz Perc
FIRSTMONDAY
2008
60views more  FIRSTMONDAY 2008»
13 years 10 months ago
Opening Pandora's box: How technologies of communication and cognition may be shifting towards a 'psycho-civilized society'
Increasingly there are indications that the uses of wireless technologies have been developed to target an individual's biological body, with specific focus upon the neuronal...
Kingsley L. Dennis