Sciweavers

4702 search results - page 20 / 941
» How to Copyright a Function
Sort
View
CRYPTO
2007
Springer
93views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Oblivious transfer (OT) is an essential building block for secure multiparty computation when there is no honest majority. In this setting, current protocols for n 3 parties requ...
Danny Harnik, Yuval Ishai, Eyal Kushilevitz
AAAI
2006
14 years 9 days ago
How Many Different "John Smiths", and Who Are They?
In this work we propose three unsupervised measures to automatically identify the number of distinct entities a given ambiguous name refers to in a corpus. We experiment with 22 a...
Anagha Kulkarni, Ted Pedersen
ECSCW
2007
14 years 11 days ago
How-To Pages: Informal Systems of Expertise Sharing
The How-To has recently emerged as a genre of online content that describes how something is done. This study focuses on computer and electronics hobbyists and their use of How-Tos...
Cristen Torrey, David W. McDonald, Bill N. Schilit...
PODS
2002
ACM
154views Database» more  PODS 2002»
14 years 11 months ago
How to Evaluate Multiple Range-Sum Queries Progressively
Decision support system users typically submit batches of range-sum queries simultaneously rather than issuing individual, unrelated queries. We propose a wavelet based technique ...
Rolfe R. Schmidt, Cyrus Shahabi
DATE
2009
IEEE
141views Hardware» more  DATE 2009»
14 years 5 months ago
How to speed-up your NLFSR-based stream cipher
— Non-Linear Feedback Shift Registers (NLFSRs) have been proposed as an alternative to Linear Feedback Shift Registers (LFSRs) for generating pseudo-random sequences for stream c...
Elena Dubrova