Sciweavers

4702 search results - page 34 / 941
» How to Copyright a Function
Sort
View
HT
1991
ACM
14 years 2 months ago
What's Eliza Doing in the Chinese Room? Incoherent Hyperdocuments - and How to Avoid Them
Research on understanding linear texts has shown that comprehension and navigation mainly depend on the reader’s ability to construct a coherent mental representation. While the...
Manfred Thüring, Jörg M. Haake, Jör...
ASIACRYPT
2009
Springer
14 years 2 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
BCSHCI
2007
14 years 12 days ago
How effective is it to design by voice?
Previous studies on usability of crowded graphical interfaces that are full of widgets like menus, buttons, palette-tools etc, have shown evidence that they create a fertile envir...
Mohammad M. Alsuraihi, Dimitris I. Rigas
USENIX
2004
14 years 9 days ago
How Xlib Is Implemented (and What We're Doing About It)
The X Window System is the de facto standard graphical environment for Linux and Unix hosts, and is usable on nearly any class of computer one could find today. Its success is par...
Jamey Sharp
CORR
2006
Springer
100views Education» more  CORR 2006»
13 years 11 months ago
How to beat the sphere-packing bound with feedback
The sphere-packing bound Esp(R) bounds the reliability function for fixed-length block-codes. For symmetric channels, it remains a valid bound even when strictly causal noiseless ...
Anant Sahai