Sciweavers

4702 search results - page 3 / 941
» How to Copyright a Function
Sort
View
ASIACRYPT
2007
Springer
14 years 4 months ago
How to Build a Hash Function from Any Collision-Resistant Function
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Thomas Ristenpart, Thomas Shrimpton
IDA
1997
Springer
14 years 1 months ago
How to Find Big-Oh in Your Data Set (and How Not to)
The empirical curve bounding problem is de ned as follows. Suppose data vectors X Y are presented such that E(Y i]) = f(X i]) where f(x) is an unknown function. The problem is to a...
Catherine C. McGeoch, Doina Precup, Paul R. Cohen
INTERACT
2003
13 years 11 months ago
How Do People Get Back to Information on the Web? How Can They Do It Better?
: In one study, people are observed to keep web information for later use through many different methods including the use of Bookmarks (or Favorites), self-addressed email, hand-w...
William P. Jones, Harry Bruce, Susan T. Dumais
CVPR
2000
IEEE
14 years 11 months ago
Learning in Gibbsian Fields: How Accurate and How Fast Can It Be?
?Gibbsian fields or Markov random fields are widely used in Bayesian image analysis, but learning Gibbs models is computationally expensive. The computational complexity is pronoun...
Song Chun Zhu, Xiuwen Liu
IUI
1997
ACM
14 years 2 months ago
Compelling Intelligent User Interfaces - How Much AI?
Efforts to incorporate intelligence into the user interface have been underway for decades, but the commercial impact of this work has not lived up to early expectations, and is n...
Lawrence Birnbaum, Eric Horvitz, David Kurlander, ...